Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Buffer Overflow Vulnerability in Moby NetSuite - exploit.company
header-logo
Suggest Exploit
vendor:
NetSuite
by:
Unknown
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: NetSuite
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:moby:netsuite
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

Buffer Overflow Vulnerability in Moby NetSuite

A buffer overflow vulnerability has been reported for Moby NetSuite that may result in a denial of service condition. It is possible to cause NetSuite to crash when a malformed POST request is received. An attacker can exploit this vulnerability by issuing a malformed POST request. When NetSuite attempts to service the malformed POST request, it will crash resulting in a denial of service. Restarting the service is necessary to restore functionality.

Mitigation:

Unknown
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/6277/info

A buffer overflow vulnerability has been reported for Moby NetSuite that may result in a denial of service condition. Reportedly, it is possible to cause NetSuite to crash when a malformed POST request is received. 

An attacker can exploit this vulnerability by issuing a malformed POST request. When NetSuite attempts to service the malformed POST request, it will crash resulting in a denial of service. Restarting the service is neccessary to restore functionality.

POST /cgi-bin/test.cgi HTTP/1.0
Content-Length: 111111111111111111111111111