A buffer overflow vulnerability lies in the web server component of Dup Scout Enterprise 9.9.14, Disk Savvy Enterprise 9.9.14, Sync Breeze Enterprise 9.9.16, and Disk Pulse Enterprise 9.9.16 where an attacker can craft a malicious GET request and exploit the web server component. Successful exploitation of the software will allow an attacker to gain complete access to the system with NT AUTHORITY / SYSTEM level privileges. The vulnerability lies due to improper handling and sanitization of the incoming request.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/42557 | third party advisory vdb entry exploit |
https://www.exploit-db.com/exploits/42560/ | third party advisory vdb entry exploit |
https://www.rapid7.com/db/modules/exploit/windows/http/disk_pulse_enterprise_get | third party advisory |
https://www.exploit-db.com/exploits/42559/ | third party advisory vdb entry exploit |
https://www.exploit-db.com/exploits/42558/ | third party advisory vdb entry exploit |