0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
BitDefender (module pdf.xmd) Infinite Loop Denial of Service PoC
================================================================ BitDefender (module pdf.xmd) Infinite Loop Denial of Service PoC ================================================================ Deny Of Service and infinite loop in BitDefender (module pdf.xmd) tested on pdf.xmd BitDefender's pdf engine by Alexandru Matei (0.1,Oct 8 2008), CRC32=A393F805 and on pdf.xmd last update by the moment of publication Deny of service occurs during parsing of included compressed streams (gotta use bdc.exe /arc option) in cause of using /FlateDecode /ASCIIHexDecode compression options and object tag /JavaScript in pdf. From time to time occurs either DoS with rewriting of arithmetic registers with the contents of user's decrypted buffer or an infinite loop during scanning after modifying stream-buffer we have such results: 775781CB 8B49 04 MOV ECX,DWORD PTR DS:[ECX+4] Access violation when reading [30333037] - use Shift+F7/F8/F9 to pass exception to program EAX 04354E20 ECX 30333033 EDX 30333033 EBX 01BF0000 ESP 0012D5B8 EBP 0012D5E0 ESI 04354E18 EDI 04352100 EIP 775781CB ntdll.775781CB http://inj3ct0r.com/sploits/6666.zip # 0day.today [2024-11-16] #