vendor:
Mercury/32
by:
mu-b
7.5
CVSS
HIGH
Stack-based buffer overflow
119
CWE
Product Name: Mercury/32
Affected Version From: Mercury/32 v4.01a (win32)
Affected Version To: Mercury/32 v4.01b (win32)
Patch Exists: NO
Related CWE:
CPE: a:mercury-interactive:mercury/32:4.01b
Platforms Tested: Windows
2006
mercurypown-v1.pl
Mercury/32 <v4.01b (win32) remote exploit. The vulnerability is caused by Mercury/32 concatenating continuation data into a fixed sized buffer disregarding the length of the original command. This allows an attacker to trigger a stack-based buffer overflow without requiring authentication. The exploit takes advantage of a stack frame that calls end_thread before returning. There are at least two different ways to exploit this vulnerability: controlling a pointer into sprintf and/or controlling a pointer to be free().
Mitigation:
Apply the latest patches and updates from the vendor. Limit access to the affected service.