header-logo
Suggest Exploit
vendor:
rtf2latex2e
by:
Unknown
7.5
CVSS
HIGH
Stack Buffer Overflow
Unknown
CWE
Product Name: rtf2latex2e
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: Unknown
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

rtf2latex2e Stack Buffer Overflow Vulnerability

rtf2latex2e is susceptible to a stack buffer overflow vulnerability. This issue occurs when the application fails to properly bounds check user-supplied image data before copying it into a fixed-size memory buffer. Remote attackers can exploit this vulnerability to alter the flow of execution, potentially executing attacker-supplied machine code in the context of the application when reading a malicious RTF file.

Mitigation:

Unknown
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11994/info

It is reported that rtf2latex2e is susceptible to a stack buffer overflow vulnerability. This issue is due to a failure of the application to properly bounds check user-supplied image data prior to copying it into a fixed-size memory buffer.

This vulnerability allows remote attackers to alter the proper flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code in the context of the application attempting to read the malicious RTF file. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25006.zip