TRN 3.6-23 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the application. Attackers can craft a malicious command-line argument with 156 bytes of padding followed by a return address to overwrite the instruction pointer and execute shellcode with user privileges.
References
Configurations
No configuration.
History
No history.
Information
Published : 2026-03-28 12:16
Updated : 2026-03-30 13:26
NVD link : CVE-2016-20042
Mitre link : CVE-2016-20042
CVE.ORG link : CVE-2016-20042
JSON object : View
Products Affected
No product.
CWE
CWE-787
Out-of-bounds Write
