vendor:
MobaXterm
by:
Xavi Beltran
7.5
CVSS
HIGH
Buffer Overflow (SEH)
119
CWE
Product Name: MobaXterm
Affected Version From: 12.1
Affected Version To: 12.1
Patch Exists: NO
Related CWE:
CPE: a:mobatek:mobaxterm:12.1
Platforms Tested: Windows
2019
Mobatek MobaXterm 12.1 – Buffer Overflow (SEH)
SEH based Buffer Overflow in the Username field of a valid session. This exploit generates a malicious MobaXterm sessions file. When the user double clicks in the session, the shellcode is going to be executed. You need to adapt the exploit to your current OS Windows version.
Mitigation:
Apply the latest patch from the vendor.