header-logo
Suggest Exploit
vendor:
Messenger
by:
SecurityFocus
7.5
CVSS
HIGH
Remote Buffer Overflow
119
CWE
Product Name: Messenger
Affected Version From: VyPRESS Messenger 2.2.2
Affected Version To: VyPRESS Messenger 2.2.2
Patch Exists: No
Related CWE: CVE-2005-0753
CPE: o:vypress:messenger:2.2.2
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2005

VyPRESS Messenger Remote Buffer Overflow Vulnerability

VyPRESS Messenger is vulnerable to a remote buffer overflow vulnerability due to a failure of the application to verify the length of user-supplied strings prior to copying them into finite process buffers. An attacker can leverage this issue to remotely execute arbitrary machine code on an affected computer with the privileges of the user running the affected application. It is possible to exploit all hosts on a local area network by sending a message to a broadcast address.

Mitigation:

No known mitigation or remediation for this vulnerability
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11310/info

VyPRESS Messenger is affected by a remote buffer overflow vulnerability. This issue is due to a failure of the application to verify the length of user-supplied strings prior to copying them into finite process buffers.

An attacker may leverage this issue to remotely execute arbitrary machine code on an affected computer with the privileges of the user running the affected application. It is possible to exploit all hosts on a local area network by sending a message to a broadcast address.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24653.zip