vendor:
RPM Select/Elite
by:
mr_me
9,3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: RPM Select/Elite
Affected Version From: v5.0
Affected Version To: v5.0
Patch Exists: YES
Related CWE: N/A
CPE: a:brooksnet:rpm_select_elite:5.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2010
RPM Select/Elite v5.0 (.xml config parsing) unicode buffer overflow PoC
RPM Select/Elite v5.0 is vulnerable to a buffer overflow vulnerability when parsing a specially crafted .xml configuration file. The vulnerability is caused due to a boundary error when copying user-supplied data into a fixed-length buffer. This can be exploited to cause a stack-based buffer overflow by e.g. supplying an overly long string in the 'lfFaceName' field. Successful exploitation may allow execution of arbitrary code.
Mitigation:
Upgrade to the latest version of RPM Select/Elite v5.0