


Perceptive Security
SOC/SIEM Consultancy

iSelect 1.4.0-2+b1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized value to the -…
Published:
27 maart 2026 om 23:00:00
Alert date:
28 maart 2026 om 13:07:27
Source:
nvd.nist.gov
Operating Systems
iSelect version 1.4.0-2+b1 contains a local buffer overflow vulnerability in the -k/--key parameter. Local attackers can exploit this by supplying an oversized value that overflows a 1024-byte stack buffer. The vulnerability allows attackers to craft malicious arguments containing NOP sleds, shellcode, and return addresses. Successful exploitation results in arbitrary code execution with user privileges. This represents a significant local privilege escalation risk for systems running the vulnerable iSelect version.
Technical details
Mitigation steps:
Affected products:
iSelect
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2016-20048
http://www.ossp.org/pkg/tool/iselect/
https://www.exploit-db.com/exploits/41076
https://www.vulncheck.com/advisories/iselect-2-b1-local-buffer-overflow-via-key-parameter
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
