Advertisement






Linux XFBurn Stack-based Buffer Overflow

CVE Category Price Severity
CVE-2018-7054 CWE-121 $5,000 High
Author Risk Exploitation Type Date
rgod High Local 2017-03-24
CPE
cpe:cpe:/a:xfburn_project:xfburn
CVSS EPSS EPSSP
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.14838 0.766616

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017030222

Below is a copy:

Linux XFBurn Stack-based Buffer Overflow################
#Exploit Title: Linux XFBurn Stack-based Buffer Overflow
#Type: CWE-121
#Exploit Author: Hosein Askari (FarazPajohan)
#Vendor HomePage: http://goodies.xfce.org/projects/applications/xfburn
#Version : 0.5.4
#Tested on: Ubuntu 17.04
#Date: 24-03-2017
#Category: Application
#Author Mail : [email protected]
#Description: This application isn't checking the return value of fopen() before using it. fopen() is failing here, returning NULL, and then NULL is passed as the stream to fprintf() #resulting Segmentation Fault.
#################
The kernel output | dmesg :
[ 2963.870884] xfburn[3739]: segfault at 0 ip 00007f1c9255f6f8 sp 00007ffd53ac2e70 error 4 in libc-2.23.so[7f1c924f1000+1bf000]
#################
The GDB output:
Thread 1 "xfburn" received signal SIGSEGV, Segmentation fault.
__GI__IO_fwrite (buf=0x555555584510, size=1, count=40, fp=0x0) at iofwrite.c:37
#################

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum