vendor:
Redir
by:
hieubl from HPT Cyber Security
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Redir
Affected Version From: 3.3
Affected Version To: 3.3
Patch Exists: YES
Related CWE: N/A
CPE: a:troglobit:redir
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Kali GNU/Linux Rolling 2019.4
2020
Redir 3.3 – Denial of Service (PoC)
The source code of redir.c contains doproxyconnect() function which has the stack overflow vulnerability. Download and build the source code, then run the program with a long string of characters as an argument. This will cause the program to crash due to the buffer overflow vulnerability.
Mitigation:
Upgrade to the latest version of Redir.