vendor:
IP-Tools
by:
Juan Prescotto
7.8
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: IP-Tools
Affected Version From: 2.5
Affected Version To: 2.5
Patch Exists: Yes
Related CWE: N/A
CPE: 2.5
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Win7 Pro SP1 64 bit
2019
IP-Tools 2.5 – Local Buffer Overflow(EggHunter)
IP-Tools 2.5 is vulnerable to a local buffer overflow vulnerability when a maliciously crafted input is sent to the 'From Addr' field in the SNMP Scanner. This can be exploited to execute arbitrary code by overwriting the EIP offset with a malicious payload. The malicious payload can be sent to the 'Log to file' field in the Logging tab of the Host Monitor option. This will allow an attacker to gain a bind shell on port 4444.
Mitigation:
Ensure that all software is up to date and patched with the latest security updates. Additionally, input validation should be implemented to prevent maliciously crafted inputs from being sent to the application.