CVE-2011-3494

eSignal <10.6.2425 - RCE/DoS

Title source: llm

Description

WinSig.exe in eSignal 10.6.2425 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a long StyleTemplate element in a QUO, SUM or POR file, which triggers a stack-based buffer overflow, or (2) a long Font->FaceName field (aka FaceName element), which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/17880
exploitdb WRITEUP
by Luigi Auriemma · textdoswindows
https://www.exploit-db.com/exploits/17837
metasploit WORKING POC NORMAL
by Luigi Auriemma · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/esignal_styletemplate_bof.rb

Scores

EPSS 0.7785
EPSS Percentile 99.0%

Details

CWE
CWE-119
Status published
Products (2)
interactivedata/esignal 10.6
interactivedata/esignal < 10.6.2425
Published Sep 16, 2011
Tracked Since Feb 18, 2026