vendor:
pIPL
by:
hack4love
9,3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: pIPL
Affected Version From: 2.5.0
Affected Version To: 2.5.0
Patch Exists: YES
Related CWE: N/A
CPE: a:programmed_integration:pipl:2.5.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009
pIPL V 2.5.0 (.PLS /.PL) Universal Local Buffer Exploit (SEH)
This exploit is a buffer overflow vulnerability in pIPL V 2.5.0 (.PLS /.PL) which allows an attacker to execute arbitrary code on the vulnerable system. The vulnerability is caused due to a boundary error when handling .PLS and .PL files, which can be exploited to cause a stack-based buffer overflow by sending a specially crafted file to the vulnerable application. Successful exploitation of this vulnerability can result in arbitrary code execution in the context of the application.
Mitigation:
Upgrade to the latest version of pIPL V 2.5.0 (.PLS /.PL) or apply the appropriate patch.