vendor:
Product Name
by:
Anonymous
8.1
CVSS
CRITICAL
Buffer Overflow
119
CWE
Product Name: Product Name
Affected Version From: All versions prior to the patched version
Affected Version To:
Patch Exists: YES
Related CWE: CVE-2021-12345
CPE: a:vendor:product
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=148894, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/scanner/udp/udp_amplification, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/dos/windows/http/ms10_065_ii6_asp_dos, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/dos/http/apache_range_dos, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/multi/misc/ibm_tm1_unauth_rce, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/misc/quest_pmmasterd_bof, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/scanner/http/litespeed_source_disclosure, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/unix/webapp/joomla_tinybrowser, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/dos/windows/rdp/ms12_020_maxchannelids
Platforms Tested: Linux
2021
Buffer Overflow Exploit in C Program
The C program contains a buffer overflow vulnerability due to improper input validation. By sending a specially crafted input, an attacker can overwrite the buffer boundaries and inject malicious code. This can lead to arbitrary code execution and potentially compromise the system. This vulnerability can be identified as CVE-2021-12345.
Mitigation:
To mitigate this vulnerability, ensure proper input validation and bounds checking in the code. Use safer functions like 'strncpy' with correct buffer sizes to prevent buffer overflows.