exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Logica HotScan SWIFT Alliance Access Interface Buffer Overflow

Logica HotScan SWIFT Alliance Access Interface Buffer Overflow
Posted Oct 10, 2012
Authored by Anil Pazvant

The Hotscan Listener interface is prone to a buffer overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. This allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.

tags | advisory, remote, denial of service, overflow, arbitrary
advisories | CVE-2012-2624
SHA-256 | 4d82bb2cdd5e00df2473121e20ac99ab0fed22e38807dad251dcffec376681c6

Logica HotScan SWIFT Alliance Access Interface Buffer Overflow

Change Mirror Download
--------------------------------------------------------------------------------

| BufferOverflow Vulnerability on Logica HotScan SWIFT Alliance Access Interface

--------------------------------------------------------------------------------

Summary

=======

Hotscan Listener interface is prone to buffer-overflow vulnerability
because the application fails to perform adequate boundary checks on
user-supplied input. This allows remote attackers to cause a denial of
service (crash) and possibly execute arbitrary code via a crafted font
file



CVE number: CVE-2012-2624

Impact: Critical

Vendor notified: May 11, 2012

Vendor response: Vendor patched the vulnerability ( June 16, 2012 )

.

Affected Products

======== ========

Logica HotScan Interface



Details

=======

By sending malicious input to hotscan listener tcp interface, it is
possible to overwrite stack only by two bytes. The software compiled
with NXCOMPAT,Code execution could not be done. Therefore crash of
this service can stop all swift process , this effects the impact of
vulnerability.

(Register output:
ECX 76E801B8 ASCII "STATUS_STACK_BUFFER_OVERRUN encountered"
EDX 0018F325 ASCII 0A,"STATUS_STA"
EBX 0042AEAC HOTS_Rec.0042AEAC
ESP 0018F56C
EBP 0018F5E8
ESI 00000000
EDI 00000000
EIP 76E7FF9A kernel32.76E7FF9A


Solution

========

Vendor released a patch to fix the bug.
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close