CVE-2024-43549 - Stack-based Buffer Overflow

Severity

88%

Complexity

27%

Confidentiality

98%

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

CVSS 3.1 Base Score 8.8. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

Demo Examples

Stack-based Buffer Overflow

CWE-121

While buffer overflow examples can be rather complex, it is possible to have very simple, yet still exploitable, stack-based buffer overflows:


               
}
strcpy(buf, argv[1]);

The buffer size is fixed, but there is no guarantee the string in argv[1] will not exceed this size and cause an overflow.

Stack-based Buffer Overflow

CWE-121

This example takes an IP address from a user, verifies that it is well formed and then looks up the hostname and copies it into a buffer.


               
}
strcpy(hostname, hp->h_name);/*routine that ensures user_supplied_addr is in the right format for conversion */

This function allocates a buffer of 64 bytes to store the hostname, however there is no guarantee that the hostname will not be larger than 64 bytes. If an attacker specifies an address which resolves to a very large hostname, then we may overwrite sensitive data or even relinquish control flow to the attacker.

Note that this example also contains an unchecked return value (CWE-252) that can lead to a NULL pointer dereference (CWE-476).

Overview

Type

Microsoft Windows Server

First reported 4 months ago

2024-10-08 18:15:00

Last updated 4 months ago

2024-10-17 19:51:00

Affected Software

Microsoft Windows Server 2012

Microsoft Windows Server 2016

Microsoft Windows Server 2019

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.