vendor:
Yasr
by:
Juan Sacco
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Yasr
Affected Version From: 0.6.9-5
Affected Version To: 0.6.9-5
Patch Exists: NO
Related CWE: N/A
CPE: a:yasr:yasr:0.6.9-5
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Kali Linux 2.0 x86
2020
Yasr Console Screen Reader – Buffer Overflow
Yasr is a general-purpose console screen reader for GNU/Linux and other Unix-like operating systems. This exploit is for educational purposes only. It uses a buffer overflow vulnerability to execute a shellcode. The exploit consists of a junk of 298 bytes, a shellcode of 28 bytes, 12 NOPs and an EIP of 4 bytes.
Mitigation:
The best way to mitigate buffer overflow attacks is to never trust user input. Input validation should be used to ensure that user input is within the expected range. Additionally, the use of a non-executable stack and randomization of memory locations can help to prevent buffer overflow attacks.