The web server in Integard Pro and Home before 2.0.0.9037 and 2.2.x before 2.2.0.9037 has a buffer overflow via a long password in an administration login POST request, leading to arbitrary code execution. An SEH-overwrite buffer overflow already existed for the vulnerable software. This CVE is to track an alternate exploitation method, utilizing an EIP-overwrite buffer overflow.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/14941 | exploit vdb entry third party advisory |
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/integard_password_bof.rb | third party advisory exploit |
https://www.exploit-db.com/exploits/15016 | exploit vdb entry third party advisory |
https://purpl3f0xsec.tech/2019/08/04/osce-prep-integard.html | url repurposed |
https://github.com/purpl3-f0x/OSCE-prep/blob/master/eip_integard.py |