SyncBack Profile File Remote Buffer Overflow

high Nessus Plugin ID 46733

Language:

Synopsis

The remote Windows host contains a program that is prone to a remote buffer overflow attack.

Description

The remote Windows host contains a version of SyncBack that is earlier than 3.2.21. Such versions are prone to a remote buffer overflow attack.

An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application by tricking the user into importing a malicious profile file.

Solution

Upgrade to SyncBack version 3.2.21 or later.

See Also

http://www.nessus.org/u?db9db69b

https://www.2brightsparks.com/freeware/changes.html

Plugin Details

Severity: High

ID: 46733

File Name: syncback_3_2_21.nasl

Version: 1.11

Type: local

Agent: windows

Family: Windows

Published: 5/26/2010

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/17/2010

Vulnerability Publication Date: 5/19/2010

Reference Information

CVE: CVE-2010-1688

BID: 40311

Secunia: 39865