vendor:
Steamcast
by:
Luigi Auriemma, His0k4
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Steamcast
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP2 (FR)
2009
Steamcast(HTTP Request) Remote Buffer Overflow Exploit (SEH)
Steamcast is vulnerable to a remote buffer overflow exploit when a maliciously crafted HTTP request is sent to the server. This exploit uses a Structured Exception Handler (SEH) overwrite to gain control of the program flow. The exploit was discovered by Luigi Auriemma and tested on Windows XP SP2 (FR).
Mitigation:
The vendor has released a patch to address this vulnerability.