vendor:
Code Blocks
by:
T3jv1l
7.8
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Code Blocks
Affected Version From: 16.01
Affected Version To: 16.01
Patch Exists: YES
Related CWE: N/A
CPE: a:codeblocks:code_blocks:16.01
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows
2020
Code Blocks 16.01 – Buffer Overflow (SEH) UNICODE
Code Blocks 16.01 is vulnerable to a buffer overflow vulnerability when a specially crafted .m3u file is opened. This vulnerability can be exploited to execute arbitrary code by overwriting the SEH handler with a malicious payload. The vulnerability is triggered when a specially crafted .m3u file is opened, which contains a buffer of 536 bytes followed by a POPAD + Aligned and POP/POP/RET instructions. The malicious payload is then placed after the POP/POP/RET instructions and is executed when the SEH handler is overwritten.
Mitigation:
The vendor has released a patch to address this vulnerability.