Oracle Outside-In LWP File Parsing Stack Based Buffer Overflow

2012-07-20T00:00:00
ID EDB-ID:19961
Type exploitdb
Reporter Francis Provencher
Modified 2012-07-20T00:00:00

Description

Oracle Outside-In LWP File Parsing Stack Based Buffer Overflow. CVE-2012-1770. Dos exploit for windows platform

                                        
                                            #####################################################################################

Application:   Oracle Outside-In LWP File Parsing Stack Based Buffer Overflow
Version:   The vulnerabilities are reported in versions 8.3.5 and 8.3.7.
Exploitation:   Remote code execution

Secunia Number:   SA49936 

{PRL}:   2012-25

Author:   Francis Provencher (Protek Research Lab's)

Website:   http://www.protekresearchlab.com/

Twitter:   @ProtekResearch

#####################################################################################

1) Introduction
2) Timeline
3) Technical details
4) PoC


#####################################################################################

===============
1) Introduction
===============
Oracle Outside In Technology provides software developers with a comprehensive solution to access,
transform, and control the contents of over 500 unstructured file formats. From the latest office suites,
such as Microsoft Office 2007, to specialty formats and legacy files, Outside In Technology provides software
developers with the tools to transform unstructured files into controllable information.
#####################################################################################

============
2) Timeline
============

2012-07-03 - Vulnerability reported to secunia
2012-07-19 - Coordinated public release of advisory

#####################################################################################

=================
3) Technical details
=================
An error in the LWPAPIN.DLL module when processing Lotus WordPro documents can be
exploited to cause a stack-based buffer overflow via a specially crafted file.
#####################################################################################

=============
4) The Code
=============

http://www.protekresearchlab.com/exploits/PRL-2012-25.lwp
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/19961.lwp