Jordan Windows Telnet Server 1.0/1.2 – ‘Username’ Stack Buffer Overrun (3)

Jordan Windows Telnet Server 1.0/1.2 – ‘Username’ Stack Buffer Overrun (3)

漏洞ID 1054337 漏洞类型
发布时间 2003-12-29 更新时间 2003-12-29
图片[1]-Jordan Windows Telnet Server 1.0/1.2 – ‘Username’ Stack Buffer Overrun (3)-安全小百科CVE编号 N/A
图片[2]-Jordan Windows Telnet Server 1.0/1.2 – ‘Username’ Stack Buffer Overrun (3)-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/23493
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/9316/info
  
Jordan Windows Telnet Server has been reported prone to a remote buffer overrun vulnerability. The issue has been reported to present itself when a username of excessive length is supplied to the Telnet server. Due to a lack of bounds checking, when this username is copied into an insufficient reserved buffer in stack-based memory, data that exceeds the size of the buffer will overrun its bounds and corrupt adjacent memory. An attacker may exploit this condition to corrupt a saved instruction pointer for the vulnerable function. 

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23493.zip

相关推荐: newsPHP 216 – Remote File Inclusion

newsPHP 216 – Remote File Inclusion 漏洞ID 1054122 漏洞类型 发布时间 2003-08-25 更新时间 2003-08-25 CVE编号 N/A CNNVD-ID N/A 漏洞平台 PHP CVSS评分 N/A |…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享