Release date:
Updated on: 2011-10-10
Affected Systems:
NCSS <= 07.1.21
Description:
--------------------------------------------------------------------------------
NCSS provides statistical analysis software to researchers, business and academic institutions.
Multiple array overflow vulnerabilities in NCSS cause 0 xfffd writing in any area of the memory. Malicious attackers can exploit the SO file to cause memory corruption.
<* Source: Luigi Auriemma (aluigi@pivx.com)
Link: http://seclists.org/bugtraq/2011/Sep/194
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Http://aluigi.org/poc/ncss_1.s0
The 16-bit value of EDX is at the offset 0x8bd.
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
NCSS
----
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.ncss.com/ncss.html