


Perceptive Security
SOC/SIEM Consultancy

MAWK 1.3.3-17 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary c…
Published:
27 maart 2026 om 23:00:00
Alert date:
28 maart 2026 om 13:07:27
Source:
nvd.nist.gov
Operating Systems
MAWK version 1.3.3-17 and prior contains a critical stack-based buffer overflow vulnerability (CVE-2017-20229) that enables remote code execution. The vulnerability stems from inadequate boundary checks on user-supplied input, allowing attackers to craft malicious input that overflows the stack buffer. Attackers can exploit this flaw to execute return-oriented programming (ROP) chains and spawn shells with application privileges. This represents a high-severity vulnerability affecting the MAWK AWK interpreter implementation. Public exploits are available on Exploit-DB, making this vulnerability particularly dangerous for systems running vulnerable MAWK versions.
Technical details
Mitigation steps:
Affected products:
MAWK
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2017-20229
https://www.exploit-db.com/exploits/42357
https://www.vulncheck.com/advisories/mawk-17-stack-based-buffer-overflow
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
