header-logo
Suggest Exploit
vendor:
Aloaha PDF Suite
by:
SecurityFocus
7,8
CVSS
HIGH
Stack-Based Buffer Overflow
119
CWE
Product Name: Aloaha PDF Suite
Affected Version From: 5.0.50
Affected Version To: 5.0.50
Patch Exists: YES
Related CWE: N/A
CPE: a:aloaha:aloaha_pdf_suite
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

Aloaha PDF Suite Stack-Based Buffer Overflow Vulnerability

Aloaha PDF Suite is prone to a stack-based buffer-overflow vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause denial-of-service conditions.

Mitigation:

Users should exercise caution when opening files from untrusted sources. Additionally, users should ensure that they are running the latest version of Aloaha PDF Suite.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/62036/info

Aloaha PDF Suite is prone to a stack-based buffer-overflow vulnerability.

Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause denial-of-service conditions. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/62036.zip