source: http://www.securityfocus.com/bid/12022/info
abcm2ps is reported prone to a remote buffer overflow vulnerability. This issue arises because the application fails to carry out proper boundary checks before copying user-supplied data into sensitive process buffers. It is reported that this issue can allow an attacker to gain unauthorized access to a computer in the context of the application.
An attacker can exploit this issue by crafting a malicious ABC file that contains excessive string data, replacement memory addresses, and executable instructions to trigger this issue.
If a user obtains this file and processes it through the application, the attacker-supplied instructions may be executed on the vulnerable computer. It is reported that successful exploitation may result in a compromise in the context of the application.
abcm2ps version 3.7.20 is reported prone to this vulnerability. It is likely that other versions are affected as well.
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25022.zip
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666