BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Publish-It Buffer Overflow Vulnerability

Disclosed February 5, 2014    Zeroday : 261 days

Vulnerability Description:

Publish-iT contains a buffer overflow when processing .PUI files. A remote attacker may exploit this by maliciously crafting a .PUI file and convincing a vulnerable user to open it, thereby gaining remote code execution on the target machine.

Vendors:

PosterSW

Vulnerable Software/Devices:

Publish-iT 3.6d and possibly other versions

Vulnerability Severity:

High

Exploit Availability:

No Exploit Available

Exploit Impact:

Remote Code Execution
Exploitation of this vulnerability is possible through the use of methods like drive-by attacks. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 32834 - Publish-It Buffer Overflow Vulnerability (20140205) (Zero-Day)
  • 32835 - Publish-It Buffer Overflow Vulnerability (20140205) (Zero-Day) - x64

Mitigation:

If possible, do not use Publish-iT. Avoid using outdated software that is not actively supported or developed.

If Publish-iT must be used, avoid opening untrusted .PUI files.

Links:

CVE(s):