SyncBreeze 10.1.16 SEH GET Overflow...

- AV AC AU C I A
发布: 2017-10-13
修订: 2025-04-13

There exists an unauthenticated SEH based vulnerability in the HTTP server of Sync Breeze Enterprise version 10.1.16, when sending a GET request with an excessive length it is possible for a malicious user to overwrite the SEH record and execute a payload that would run under the Windows NT AUTHORITY\SYSTEM account. The SEH record is overwritten with a "POP,POP,RET" pointer from the application library libspp.dll. This exploit has been successfully tested on Windows XP, 7 and 10 (x86->x64). It should work against all versions of Windows and service packs.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息