Lucene search

K
exploitdbJerome AthiasEDB-ID:30255
HistoryJun 28, 2007 - 12:00 a.m.

PC SOFT WinDEV 11 - '.WDP' File Parsing Stack Buffer Overflow

2007-06-2800:00:00
Jerome Athias
www.exploit-db.com
22

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/24693/info

PC SOFT WinDEV is prone to a stack-based buffer-overflow vulnerability when it attempts to process malformed project files. This issue occurs because the application fails to perform proper bounds-checking on user-supplied data before copying it to an insufficiently sized memory buffer.

An attacker may exploit this issue to execute arbitrary code with the privileges of the user running the vulnerable application or to cause denial-of-service conditions. This may facilitate unauthorized access or privilege escalation.

PC SOFT WinDEV 11 is reported vulnerable; other versions and related products (WinDEV Express, Mobile, and WebDEV) may also be affected. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30255.zip

AI Score

7.4

Confidence

Low

Related for EDB-ID:30255