6.8
CVSSv2

CVE-2012-4409

Published: 21/11/2012 Updated: 02/04/2013
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 690
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the check_file_head function in extra.c in mcrypt 2.6.8 and previous versions allows user-assisted remote malicious users to execute arbitrary code via an encrypted file with a crafted header containing long salt data that is not properly handled during decryption.

Vulnerable Product Search on Vulmon Subscribe to Product

mcrypt mcrypt 2.6.5

mcrypt mcrypt 2.6.4

mcrypt mcrypt

mcrypt mcrypt 2.6.7

mcrypt mcrypt 2.6.6

Exploits

mcrypt versions 258 and below stack based overflow exploit Bypasses NX and ASLR protections ...
#!/usr/bin/env python # mcrypt <= 268 stack-based buffer overflow poc # mcryptsourceforgenet/ # (the command line tool, not the library) # # date: 2012-09-04 # exploit author: _ishikawa # tested on: ubuntu 12041 # tech: it overflows in check_file_head() when decrypting nc files with too long salt data # # shout-outs to all cryptop ...
#!/usr/bin/perl # Title : mcrypt <= 258 STACK based overflow # Date : 23/11/2012 # Exploit Author : Tosh # CVE : CVE-2012-4409 # Patch : wwwopenwallcom/lists/oss-security/2012/09/06/8 # Tested on : Archlinux 366-1, without SSP # This script exploit a stack based overflow in mcrypt < ...