CVE-2010-20112
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-21

Last updated on: 2025-08-22

Assigner: VulnCheck

Description
Amlib’s NetOpacs webquery.dll contains a stack-based buffer overflow vulnerability triggered by improper handling of HTTP GET parameters. Specifically, the application fails to enforce bounds on input supplied to the app parameter, allowing excessive data to overwrite memory structures including the Structured Exception Handler (SEH). Additionally, malformed parameter names followed by an equals sign may result in unintended control flow behavior. This vulnerability is exposed through IIS and affects legacy Windows deployments
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-21
Last Modified
2025-08-22
Generated
2026-05-06
AI Q&A
2025-08-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
amlib netopacs *
amlib webquery 4.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stack-based buffer overflow in Amlib's NetOpacs webquery.dll caused by improper handling of HTTP GET parameters. Specifically, the application does not enforce limits on the size of input provided to the 'app' parameter, allowing attackers to send excessively large data that can overwrite memory structures, including the Structured Exception Handler (SEH). Additionally, malformed parameter names followed by an equals sign can cause unintended control flow behavior. This issue is exposed through IIS and affects legacy Windows deployments.


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to arbitrary code execution or application crashes due to the buffer overflow and overwritten memory structures. Attackers could potentially gain control over the affected system or cause denial of service by triggering unintended control flow behavior.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart