The web server in Integard Pro and Home before 2.0.0.9037 and 2.2.x before 2.2.0.9037 has a buffer overflow via a long password in an administration login POST request, leading to arbitrary code execution. An SEH-overwrite buffer overflow already existed for the vulnerable software. This CVE is to track an alternate exploitation method, utilizing an EIP-overwrite buffer overflow.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/15016 | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/14941 | Exploit Third Party Advisory VDB Entry |
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/integard_password_bof.rb | Exploit Third Party Advisory |
https://purpl3f0xsec.tech/2019/08/04/osce-prep-integard.html | |
https://github.com/purpl3-f0x/OSCE-prep/blob/master/eip_integard.py |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-09-13 09:15
Updated : 2019-09-24 10:15
NVD link : CVE-2010-5333
Mitre link : CVE-2010-5333
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
integard_pro_project
- integard_pro
integard_home_project
- integard_home