
1979 changes to exploits/shellcodes Couchdb 1.5.0 - 'uuids' Denial of Service Apache CouchDB 1.5.0 - 'uuids' Denial of Service Beyond Remote 2.2.5.3 - Denial of Service (PoC) udisks2 2.8.0 - Denial of Service (PoC) Termite 3.4 - Denial of Service (PoC) SoftX FTP Client 3.3 - Denial of Service (PoC) Silverstripe 2.3.5 - Cross-Site Request Forgery / Open redirection SilverStripe CMS 2.3.5 - Cross-Site Request Forgery / Open Redirection Silverstripe CMS 3.0.2 - Multiple Vulnerabilities SilverStripe CMS 3.0.2 - Multiple Vulnerabilities Silverstripe CMS 2.4 - File Renaming Security Bypass SilverStripe CMS 2.4 - File Renaming Security Bypass Silverstripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities SilverStripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities Silverstripe CMS 2.4.7 - 'install.php' PHP Code Injection SilverStripe CMS 2.4.7 - 'install.php' PHP Code Injection Silverstripe Pixlr Image Editor - 'upload.php' Arbitrary File Upload SilverStripe CMS Pixlr Image Editor - 'upload.php' Arbitrary File Upload Silverstripe CMS 2.4.x - 'BackURL' Open Redirection SilverStripe CMS 2.4.x - 'BackURL' Open Redirection Silverstripe CMS - 'MemberLoginForm.php' Information Disclosure SilverStripe CMS - 'MemberLoginForm.php' Information Disclosure Silverstripe CMS - Multiple HTML Injection Vulnerabilities SilverStripe CMS - Multiple HTML Injection Vulnerabilities Apache CouchDB 1.7.0 and 2.x before 2.1.1 - Remote Privilege Escalation Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation Monstra CMS before 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (2) Monstra CMS < 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (1) Navigate CMS 2.8 - Cross-Site Scripting Collectric CMU 1.0 - 'lang' SQL injection Joomla! Component CW Article Attachments 1.0.6 - 'id' SQL Injection LG SuperSign EZ CMS 2.5 - Remote Code Execution MyBB Visual Editor 1.8.18 - Cross-Site Scripting Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection RICOH Aficio MP 301 Printer - Cross-Site Scripting Joomla! Component Auction Factory 4.5.5 - 'filter_order' SQL Injection RICOH MP C6003 Printer - Cross-Site Scripting Linux/ARM - Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (28 Bytes) Linux/ARM - sigaction() Based Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (52 Bytes)
29 lines
No EOL
1.9 KiB
Text
29 lines
No EOL
1.9 KiB
Text
# Exploit Title: Foxit Reader 5.4.3.* - 5.4.5.0124 - PDF (Portable Document Format) XREF (Cross Reference Table) parsing Denial of Service Vulnerability
|
|
# Date (found): 2012.11.17
|
|
# Date (publish): 2013.04.17
|
|
# Exploit Author: FuzzMyApp
|
|
# Vendor Homepage: http://www.foxitsoftware.com
|
|
# Version: 5.4.3.* - 5.4.5.0124 (till latest)
|
|
# Tested on: Windows XP SP3 Professional Edition
|
|
|
|
Name:PDF Cross Reference Table parsing Denial of Service vulnerability.
|
|
Type:DoS
|
|
Description:Foxit Reader does not validate data in PDF Cross Reference Table (XREF) header properly. Tampering with XREF header may lead to integer division by zero exception during its parsing by the application. Raised, not handled, exception causes Denial of Service of Foxit Reader. Vendor was notified on 2013.02.21 but has not responded to this submission. This issue is present in the latest version of application avaiable at the time of writing.
|
|
Exception:Integer division by zero exception.
|
|
Disasm:0055EB70 |> \33C0 |XOR EAX,EAX
|
|
0055EB72 |> 8B28 |MOV EBP,DWORD PTR DS:[EAX]
|
|
0055EB74 |. 896C24 64 |MOV DWORD PTR SS:[ESP+64],EBP
|
|
0055EB78 |. 8D3C2E |LEA EDI,DWORD PTR DS:[ESI+EBP]
|
|
0055EB7B |. 3BFE |CMP EDI,ESI
|
|
0055EB7D |. 897C24 20 |MOV DWORD PTR SS:[ESP+20],EDI
|
|
0055EB81 |. 0F82 7F020000 |JB Foxit_Re.0055EE06
|
|
0055EB87 |. 83C8 FF |OR EAX,FFFFFFFF
|
|
0055EB8A |. 33D2 |XOR EDX,EDX
|
|
0055EB8C |. F7F7 |DIV EDI ; [www.FuzzMyApp.com] Integer division by zero exception
|
|
0055EB8E |. 394424 3C |CMP DWORD PTR SS:[ESP+3C],EAX
|
|
0055EB92 |. 0F83 6E020000 |JNB Foxit_Re.0055EE06
|
|
|
|
Advisory: http://www.fuzzmyapp.com/advisories/FMA-2012-042/FMA-2012-042-EN.xml
|
|
|
|
Exploit PoC: http://fuzzmyapp.com/advisories/FMA-2012-042/FMA-2012-042.pdf
|
|
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24962.pdf |