exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 1 of 1 RSS Feed

Files

WinAsm *.RC File Buffer Overflow
Posted Apr 16, 2010
Authored by sharpe

A vulnerability has been discovered in WinAsm Studio, which can be exploited by malicious, anonymous individuals to compromise a vulnerable system. The vulnerability is caused as a result of improper bounds checking when reading *.RC files. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a maliciously constructed WinAsm project. Successful exploitation of this vulnerability enables execution of arbitrary code.

tags | advisory, overflow, arbitrary
SHA-256 | cac61971a806256c82d88639df3941d774e2d8d97822a4753e3252dbfc46d176
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close