vendor:
VideoCharge Studio
by:
@evil_comrade
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: VideoCharge Studio
Affected Version From: 3.16.4.06
Affected Version To: 3.16.4.06
Patch Exists: NO
Related CWE: N/A
CPE: a:videocharge:videocharge_studio:3.16.4.06
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP3
2015
VideoCharge v3.16.4.06
VideoCharge v3.16.4.06 is vulnerable to a buffer overflow vulnerability. An attacker can create a malicious XML file with a buffer of 1000 A's and crash the program. The program only allows ascii printable characters and 5c (retn) is a bad character (no push[reg] ret, jmp[reg] or call[reg]).
Mitigation:
Input validation should be done to prevent buffer overflow attacks.