Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Buffer Overflow in libgtop2 Library - exploit.company
header-logo
Suggest Exploit
vendor:
libgtop2
by:
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: libgtop2
Affected Version From: Prior to libgtop2 2.14.6
Affected Version To:
Patch Exists: YES
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Buffer Overflow in libgtop2 Library

The 'libgtop2' library is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying into an insufficiently sized memory buffer. An attacker may exploit this issue by enticing victims into viewing a maliciously crafted system process with an application that uses the affected library. Successful exploits may cause arbitrary code to run with the privileges of the victim. Failed exploit attempts will likely cause denial-of-service conditions.

Mitigation:

Upgrade to libgtop2 version 2.14.6 or later.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/22054/info

The 'libgtop2' library is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying into an insufficiently sized memory buffer.

An attacker may exploit this issue by enticing victims into viewing a maliciously crafted system process with an application that uses the affected library.

Successful exploits may cause arbitrary code to run with the privileges of the victim. Failed exploit attempts will likely cause denial-of-service conditions.

Versions prior to libgtop2 2.14.6 are reported vulnerable. 

export dir=$(perl -e " print 's/'x1000;")
mkdir -p $dir
cp /bin/sleep $dir
$dir/sleep 100 &
gnome-system-monitor