TiEmu 3.03 Buffer Overflow Vulnerability (CVE-2016-20040)
TiEmu 3.03 is vulnerable to a buffer overflow in ROM parameter handling, enabling local attackers to crash the application or execute arbitrary code by providing an oversized ROM parameter via the command-line interface.
TiEmu, a Texas Instruments (TI) calculator emulator, version 3.03-nogdb+dfsg-3, is susceptible to a buffer overflow vulnerability (CVE-2016-20040). This flaw resides within the handling of ROM parameters passed via the command-line interface. An unauthenticated, local attacker can exploit this vulnerability by supplying an oversized ROM parameter. Successful exploitation allows the attacker to crash the application, potentially leading to a denial of service, or, more seriously, execute…
Detection coverage 2
Detect TiEmu with Oversized ROM Parameter
highDetects TiEmu being executed with a long ROM parameter, which may indicate an attempted buffer overflow exploit.
Detect TiEmu Process Execution
lowDetects execution of the TiEmu process.
Detection queries are kept inside the platform. Get full rules →