top of page
perceptive_background_267k.jpg

iSelect 1.4.0-2+b1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized value to the -…

Published:

27 maart 2026 om 23:00:00

Alert date:

28 maart 2026 om 13:07:27

Source:

nvd.nist.gov

Click to open the original link from this advisory

Operating Systems

iSelect version 1.4.0-2+b1 contains a local buffer overflow vulnerability in the -k/--key parameter. Local attackers can exploit this by supplying an oversized value that overflows a 1024-byte stack buffer. The vulnerability allows attackers to craft malicious arguments containing NOP sleds, shellcode, and return addresses. Successful exploitation results in arbitrary code execution with user privileges. This represents a significant local privilege escalation risk for systems running the vulnerable iSelect version.

Technical details

Mitigation steps:

Affected products:

iSelect

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page