Skip to content
Threat Feed
high advisory

TiEmu 3.03 Buffer Overflow Vulnerability (CVE-2016-20040)

TiEmu 3.03 is vulnerable to a buffer overflow in ROM parameter handling, enabling local attackers to crash the application or execute arbitrary code by providing an oversized ROM parameter via the command-line interface.

TiEmu, a Texas Instruments (TI) calculator emulator, version 3.03-nogdb+dfsg-3, is susceptible to a buffer overflow vulnerability (CVE-2016-20040). This flaw resides within the handling of ROM parameters passed via the command-line interface. An unauthenticated, local attacker can exploit this vulnerability by supplying an oversized ROM parameter. Successful exploitation allows the attacker to crash the application, potentially leading to a denial of service, or, more seriously, execute…

Detection coverage 2

Detect TiEmu with Oversized ROM Parameter

high

Detects TiEmu being executed with a long ROM parameter, which may indicate an attempted buffer overflow exploit.

sigma tactics: execution techniques: T1059.004 sources: process_creation, linux

Detect TiEmu Process Execution

low

Detects execution of the TiEmu process.

sigma tactics: execution techniques: T1059.004 sources: process_creation, linux

Detection queries are kept inside the platform. Get full rules →