Lucene search

K
zdiAndrea Micalizzi (rgod)ZDI-15-246
HistoryMay 27, 2015 - 12:00 a.m.

(0Day) Wavelink Emulation ConnectPro TermProxy WLTermProxyService.exe HTTP Request Headers Remote Code Execution Vulnerability

2015-05-2700:00:00
Andrea Micalizzi (rgod)
www.zerodayinitiative.com
23

EPSS

0.914

Percentile

98.9%

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Wavelink Emulation ConnectPro TermProxy. User interaction is not required to exploit this vulnerability. The specific flaw exists in the parsing of HTTP requests in WLTermProxyService.exe listening by default on port 4428. When parsing large HTTP headers, the application will overflow a heap buffer due to an unsafe memory block copy operation. An attacker could leverage this to execute arbitrary code in the context of SYSTEM.

EPSS

0.914

Percentile

98.9%

Related for ZDI-15-246