Untriaged
Permalink
CVE-2016-20048
8.4 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
iSelect 1.4.0-2+b1 Local Buffer Overflow via key parameter
iSelect 1.4.0-2+b1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized value to the -k/--key parameter. Attackers can craft a malicious argument containing a NOP sled, shellcode, and return address to overflow a 1024-byte stack buffer and gain code execution with user privileges.
References
-
ExploitDB-41076 exploit
-
Official Product Homepage product
-
VulnCheck Advisory: iSelect 1.4.0-2+b1 Local Buffer Overflow via key parameter third-party-advisory
Affected products
iSelect
- ==1.4.0-2+b1
Matching in nixpkgs
pkgs.python312Packages.django-multiselectfield
Multiple Choice model field for Django
pkgs.python313Packages.django-multiselectfield
Multiple Choice model field for Django
pkgs.python314Packages.django-multiselectfield
Multiple Choice model field for Django