vendor:
XBMC
by:
n00b
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: XBMC
Affected Version From: Linux windows
Affected Version To: Tested:Win xp sp2 eng
Patch Exists: YES
Related CWE: N/A
CPE: o:xbmc:xbmc
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2009
Xbmc takescreenshot request remote buffer overflow 8.10 !!!
This exploit happens when parsing and overly long file name to the server using the takescreenshot command. There is a description in the poc code. When passing this to the http server we can evade url: filtering as it is passed to the application as an overly long dir. This means we can use any shell code we wish.
Mitigation:
Apply the latest security patches and updates to the affected system.