vendor:
RadAsm
by:
DATA_SNIPER
7.5
CVSS
HIGH
Pointer Hijack Exploit
119
CWE
Product Name: RadAsm
Affected Version From: 2.2.1.5
Affected Version To: 2.2.1.5
Patch Exists: YES
Related CWE: N/A
CPE: a:radasm:radasm
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP2 FR
2009
RadAsm <=2.2.1.5 WindowCallProcA Pointer Hijack Exploit
RadAsm <=2.2.1.5 is vulnerable to a pointer hijack exploit. A long buffer passed to the program by Group key in the project file '.rap files' can lead to overwrite the pointer of WindowCallProcA that was stored in memory. This can be exploited to execute arbitrary code by overwriting the pointer with the address of the shellcode.
Mitigation:
Upgrade to the latest version of RadAsm.