vendor:
Amaya
by:
r0ut3r
7.5
CVSS
HIGH
Stack Overflow
119
CWE
Product Name: Amaya
Affected Version From: 10.1
Affected Version To: 10.1
Patch Exists: YES
Related CWE: N/A
CPE: a:w3c:amaya:10.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
W3C Amaya 10.1 Web Browser Amaya (id) Remote Stack Overflow Vulnerability
The application fails to correctly process certain bytes, such as 0x9c becoming 0x9cc2. After reviewing the source code, the below function modifies the shellcode: Line 902: int TtaWCToMBstring (wchar_t src, unsigned char **dest). The max value which can be used is 0x1fffff. The 'id' variable of a tag contains a buffer overflow, which will not overflow with normal alphanumeric characters. To fill the buffer, 'A/' must be repeated 91 times. The ESP points to data after EIP. A proof of concept is provided in the text.
Mitigation:
Ensure that the application is updated to the latest version and that all security patches are applied.