header-logo
Suggest Exploit
vendor:
EDItran Communications Platform
by:
Unknown
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: EDItran Communications Platform
Affected Version From: 4.1 R7
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: a:editcp:editcp:4.1_R7
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Remote Buffer Overflow in EDItran Communications Platform

The EDItran Communications Platform (editcp) is vulnerable to a remote buffer overflow due to insufficient input validation. Attackers can exploit this vulnerability to execute arbitrary code within the context of the application. Failed attacks may lead to a denial-of-service condition.

Mitigation:

Apply vendor-supplied patches or updates to fix the vulnerability. Restrict network access to the affected application.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/41342/info

EDItran Communications Platform (editcp) is prone to a remote buffer-overflow vulnerability because it fails to properly validate user-supplied input before copying it into a fixed-length buffer.

Attackers can exploit this issue to execute arbitrary code in the context of the application. Failed attacks may cause a denial-of-service condition.

editcp 4.1 R7 is vulnerable; other versions may also be affected.

$ perl -e '{print "A"x100}' | nc www.example.com:7777