vendor:
WordViewer
by:
Disco
7.8
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: WordViewer
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006
Two Stage Bug
This exploit is a two stage bug which forces the code down a wrong path. The first mod forces the code down a wrong path and the second mod by itself is harmless, however when used with the first it will be the first and part of the second overwrite. The weight destination address is calculated by weight * 4[EDI] + 4[ECX*4] + source memory offset[ESI]. The marker is located at 000027e4 with a value of 41414141.
Mitigation:
Input validation and proper sanitization of user input should be done to prevent buffer overflow.