top of page
perceptive_background_267k.jpg

MAWK 1.3.3-17 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary c…

Published:

27 March 2026 at 23:00:00

Alert date:

28 March 2026 at 13:07:27

Source:

nvd.nist.gov

Click to open the original link from this advisory

Operating Systems

MAWK version 1.3.3-17 and prior contains a critical stack-based buffer overflow vulnerability (CVE-2017-20229) that enables remote code execution. The vulnerability stems from inadequate boundary checks on user-supplied input, allowing attackers to craft malicious input that overflows the stack buffer. Attackers can exploit this flaw to execute return-oriented programming (ROP) chains and spawn shells with application privileges. This represents a high-severity vulnerability affecting the MAWK AWK interpreter implementation. Public exploits are available on Exploit-DB, making this vulnerability particularly dangerous for systems running vulnerable MAWK versions.

Technical details

Mitigation steps:

Affected products:

MAWK

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page