vendor:
cmd.exe
by:
John Page (aka hyp3rlinx)
7,8
CVSS
HIGH
Stack Buffer Overflow
119
CWE
Product Name: cmd.exe
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: o:microsoft:windows
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: OS/2, eComStation, ArcaOS, Microsoft Windows (Windows NT family and Windows CE family), and ReactOS operating systems.
2021
Microsoft Windows cmd.exe – Stack Buffer Overflow
Specially crafted payload will trigger a Stack Buffer Overflow in the NT Windows "cmd.exe" commandline interpreter. Requires running an already dangerous file type like .cmd or .bat. However, when cmd.exe accepts arguments using /c /k flags which execute commands specified by string, that will also trigger the buffer overflow condition.
Mitigation:
Ensure that the system is running the latest version of cmd.exe and that all security patches are up to date.