Impact
Mapscrn 2.0.3 contains a stack-based buffer overflow that enables a local attacker to supply an oversized input buffer and overwrite the stack. By crafting a payload that includes junk data, a return address, NOP instructions, and shellcode, the attacker can either execute arbitrary code or crash the application, leading to a denial of service. The weakness is identified as CWE-787, a classic buffer overflow scenario.
Affected Systems
The vulnerability affects the Mapscrn application from vendor msk, specifically version 2.0.3. No other versions are listed as impacted in the available data.
Risk and Exploitability
With a CVSS score of 8.6 the vulnerability is classified as high severity. Exploitation requires local access to the system and the ability to launch Mapscrn with a crafted input, so the attack vector is likely local. The EPSS score is not provided and the vulnerability is not currently listed in CISA’s KEV catalog, but the high CVSS rating and local exploitation potential represent a significant risk to systems running the affected version.
OpenCVE Enrichment