CVE-2023-54330
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Inbit Messenger versions 4.6.0 to 4.9.0 contain a remote stack-based buffer overflow vulnerability that allows unauthenticated attackers to execute arbitrary code by sending malformed network packets. Attackers can craft a specially designed payload targeting the messenger's network handler to overwrite the Structured Exception Handler (SEH) and execute shellcode on vulnerable Windows systems.
Analysis
Inbit Messenger 4.6.0-4.9.0 has a second stack buffer overflow in the network handler. SEH overwrite leads to shellcode execution on Windows. PoC available.
Technical Context
Malformed network packets overflow a stack buffer (CWE-121), overwriting the Structured Exception Handler chain for code execution.
Affected Products
Inbit Messenger 4.6.0-4.9.0
Remediation
Update Inbit Messenger.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today