Description
Stack-based buffer overflow in lpd.exe in Mocha W32 LPD 1.9 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted "recieve jobs" request. NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by mr_me · pythondoswindows
https://www.exploit-db.com/exploits/12240
References (4)
Core 4
Core References
Various Sources x_refsource_misc
http://www.corelan.be:8800/wp-content/forum-file-uploads/mr_me/mochalpd.py_.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/63902
Various Sources x_refsource_misc
http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-023-mocha-lpd-remote-buffer-overflow/
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/39394
Scores
EPSS
0.0703
EPSS Percentile
91.5%
Details
CWE
CWE-119
Status
published
Products (1)
mochasoft/mocha_w32_lpd
1.9
Published
May 04, 2010
Tracked Since
Feb 18, 2026