CVE-2010-20112
Severity CVSS v4.0:
CRITICAL
Type:
CWE-121
Stack-based Buffer Overflow
Publication date:
21/08/2025
Last modified:
22/08/2025
Description
Amlib’s NetOpacs webquery.dll contains a stack-based buffer overflow vulnerability triggered by improper handling of HTTP GET parameters. Specifically, the application fails to enforce bounds on input supplied to the app parameter, allowing excessive data to overwrite memory structures including the Structured Exception Handler (SEH). Additionally, malformed parameter names followed by an equals sign may result in unintended control flow behavior. This vulnerability is exposed through IIS and affects legacy Windows deployments
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
References to Advisories, Solutions, and Tools
- https://advisories.checkpoint.com/defense/advisories/public/2013/cpai-2013-1344.html
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/amlibweb_webquerydll_app.rb
- https://www.amlib.co.uk/product/product.aspx?menuId=top_products
- https://www.exploit-db.com/exploits/16793
- https://www.fortiguard.com/encyclopedia/ips/24002
- https://www.vulncheck.com/advisories/amlibweb-netopacs-stack-buffer-overflow
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/amlibweb_webquerydll_app.rb
- https://www.exploit-db.com/exploits/16793



