This exploit targets a stack-based buffer overflow in BSIGN v0.4.5 by overflowing a buffer with a crafted payload containing shellcode, NOPs, and a controlled EIP to achieve arbitrary code execution. The exploit is designed for local execution on GNU/Linux systems.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:BSIGN v0.4.5 and prior
No auth needed
Prerequisites:Local access to the target system · BSIGN v0.4.5 or prior installed