exploit-db-mirror/platforms/linux/local/19803.txt
Offensive Security 5924dde297 DB: 2015-03-19
2 new exploits
2015-03-19 09:39:10 +00:00

5 lines
No EOL
639 B
Text
Executable file

source: http://www.securityfocus.com/bid/1047/info
wmcdplay is cdplayer generally used with the WindowMaker X11 window-manager on unix systems. While wmcdplay is rarely installed at all by default, when it is installed it is typically set setuid root. wmcdplay is vulnerable to a buffer overflow attack due to lack of bounds checking on an argument it is passed. As a result, a local user can elevate their priviliges to root through overruning the stack and executing arbitrary code with the effective user-id of the process (root).
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/19803.tar.gz