首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Nitro PDF Reader 1.4.0 Heap Memory Corruption PoC
来源:www.zeroscience.mk 作者:LiquidWorm 发布时间:2011-03-01  

Nitro PDF Reader 1.4.0 Remote Heap Memory Corruption / DoS PoC


Vendor: Nitro PDF, Inc., Nitro PDF Pty Ltd.
Product web page: http://www.nitroreader.com
Affected version: 1.4.0.11

Summary: Nitro PDF Reader, free, fast, powerfull and secure.
Create PDF files, comment and review, save PDF forms, extract
text and images, type text directly onto the page, and more.

Desc: The program suffers from a heap corruption vulnerability
which can be exploited by malicious people to cause a denial of
service and potentially compromise a vulnerable system. The
vulnerability is caused when processing malicious PDF file which
triggers a heap corruption state resulting in a crash.

--------------------------------------------------------------

(bc8.b54): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=0023f72c ebx=097e9c48 ecx=baadf00d edx=015ee620 esi=097e9c48 edi=097e1da0
eip=01604b77 esp=0023f708 ebp=00000000 iopl=0         nv up ei ng nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00010282
Defaulted to export symbols for C:\Program Files\Nitro PDF\Reader\npdf.dll -
npdf!ProvideCoreHFT+0x170517:
01604b77 8b01            mov     eax,dword ptr [ecx]  ds:0023:baadf00d=????????

--------------------------------------------------------------

Tested on: MS Windows XP Pro SP3 (en)

Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
liquidworm gmail com

Advisory ID: ZSL-2011-4999
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-4999.php


21.02.2011


--------

PoC:
http://www.exploit-db.com/sploits/nitropdf_poc.rar
http://www.zeroscience.mk/codes/nitropdf_poc.rar

--------


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Magic Music Editor .cda Denial
·Home FTP SERVER 1.12 Directory
·Movavi VideoSuite 8.0 Buffer O
·Quick 'n Easy FTP Server 3.2 D
·MS Visual Studio 9.0 .vbproj B
·PHP Exif Extension 'exif_read_
·MS Visual Studio 9.0 .csproj B
·Vsftpd 2.3.2 Denial Of Service
·DivX Player Skins 6.8.2.1 Buff
·Vsftpd version 2.3.2 proof of
·KMPlayer Skins 2.9.3.1 Buffer
·MS11-011(CVE-2011-0045): MS Wi
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved