header-logo
Suggest Exploit
vendor:
VB2C
by:
Unknown
7.5
CVSS
HIGH
Remote Buffer Overflow
119
CWE
Product Name: VB2C
Affected Version From: 0.02
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

VB2C Remote Buffer Overflow Vulnerability

VB2C is prone to a remote buffer overflow vulnerability. This vulnerability occurs due to the application's failure to properly check boundaries before copying user-supplied data into sensitive process buffers. An attacker can exploit this issue by crafting a malicious FRM file containing excessive string data, replacement memory addresses, and executable instructions. If a user processes the file through the application, the attacker's instructions may be executed, potentially compromising the vulnerable computer.

Mitigation:

It is recommended to update to a patched version of VB2C or to apply any relevant security patches provided by the vendor.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/12020/info

VB2C is reported prone to a remote buffer overflow vulnerability. This issue arises because the application fails to carry out proper boundary checks before copying user-supplied data in to sensitive process buffers. It is reported that this issue can allow an attacker to gain unauthorized access to a computer in the context of the application.

An attacker can exploit this issue by crafting a malicious FRM file that contains excessive string data, replacement memory addresses, and executable instructions to trigger this issue.

If a user obtains this file and processes it through the application, the attacker-supplied instructions may be executed on the vulnerable computer. It is reported that successful exploitation may result in a compromise in the context of the application.

VB2C version 0.02 is reported prone to this vulnerability. It is likely that other versions are affected as well. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25020.zip