vendor:
UpClient
by:
Gino Thomas
7.2
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: UpClient
Affected Version From: UpClient 5.0b7
Affected Version To: UpClient 5.0b7
Patch Exists: YES
Related CWE: N/A
CPE: //a:upclient
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: FreeBSD
2003
NuxAcid – UPCLIENT Local Buffer Overflow Exploit
upclient has been reported prone to a buffer overflow vulnerability when handling command line arguments of excessive length. It is possible for a local attacker to seize control of the vulnerable application and have malicious arbitrary code executed in the context of upclient. An attacker may harness elevated privileges obtained in this way to manipulate arbitrary areas in system memory through /dev/mem or /dev/kmem devices.
Mitigation:
Input validation should be used to prevent buffer overflows.