exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 1 of 1 RSS Feed

Files

Orbital Viewer ORB File Parsing Buffer Overflow
Posted Mar 9, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in David Manthey's Orbital Viewer. When processing .ORB files, data is read from file into a fixed-size stack buffer using the fscanf function. Since no bounds checking is done, a buffer overflow can occur. Attackers can execute arbitrary code by convincing their victim to open an ORB file.

tags | exploit, overflow, arbitrary
advisories | CVE-2010-0688
SHA-256 | 46ef3749fafdda88696ed761f5421d74f5a63031de7f9f8a7eedcc6d42bda3cd
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close