Posts Tagged ‘buffer’

Disk Pulse Enterprise 9.9.16 GET Buffer Overflow

This Metasploit module exploits an SEH buffer overflow in Disk Pulse Enterprise version 9.9.16. If a malicious user sends a crafted HTTP GET request it is possible to execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. Source: Disk Pulse Enterprise 9.9.16 GET Buffer Overflow


Dameware Mini Remote Control 4.0 Username Stack Buffer Overflow

This Metasploit module exploits a stack based buffer overflow vulnerability found in Dameware Mini Remote Control v4.0. The overflow is caused when sending an overly long username to the DWRCS executable listening on port 6129. The username is read into a strcpy() function causing an overwrite of the return pointer leading to arbitrary code execution. […]