vendor:
rundll32.exe
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: rundll32.exe
Affected Version From: Windows XP SP1
Affected Version To: Other versions might also be affected
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2002
Buffer Overflow Vulnerability in rundll32.exe
rundll32.exe has been reported prone to a buffer overflow vulnerability. The condition has been reported to be triggered when an excessive string is passed to the vulnerable application as a routine name for a module. Exploitation of this issue may be hindered, due to the fact that user-supplied data is converted to Unicode.
Mitigation:
Ensure that user-supplied data is properly validated and filtered before being passed to the vulnerable application.