An issue was discovered in Reprise RLM 14.2. By using an admin account, an attacker can write a payload to /goform/edit_opt, which will then be triggered when running the diagnostics (via /goform/diagnostics_doit), resulting in a buffer overflow.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://reprisesoftware.com/admin/rlm-admin-download.php?&euagree=yes | product vendor advisory patch |
http://packetstormsecurity.com/files/165193/Reprise-License-Manager-14.2-Buffer-Overflow.html | third party advisory vdb entry exploit |