Exploit Oracle Outside-In - '.FPX' File Parsing Heap Overflow

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19960
Проверка EDB
  1. Пройдено
Автор
FRANCIS PROVENCHER
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2012-1744
Дата публикации
2012-07-20
Oracle Outside-In - '.FPX' File Parsing Heap Overflow
Код:
#####################################################################################

Application:   Oracle Outside-In FPX File Parsing Heap Overflow
Version:   he vulnerabilities are reported in versions 8.3.5 and 8.3.7.
Exploitation:   Remote code execution

Secunia Number:   SA49936 

{PRL}:   2012-26

Author:   Francis Provencher (Protek Research Lab's)

Website:   http://www.protekresearchlab.com/

Twitter:   @ProtekResearch

#####################################################################################

1) Introduction
2) Timeline
3) Technical details
4) PoC


#####################################################################################

===============
1) Introduction
===============
Oracle Outside In Technology provides software developers with a comprehensive solution to access,
transform, and control the contents of over 500 unstructured file formats. From the latest office suites,
such as Microsoft Office 2007, to specialty formats and legacy files, Outside In Technology provides software
developers with the tools to transform unstructured files into controllable information.
#####################################################################################

============
2) Timeline
============

2012-05-02 - Vulnerability reported to secunia
2012-07-19 - Coordinated public release of advisory

#####################################################################################

=================
3) Technical details
=================
An error in the FPX graphic import filter (ibfpx2.flt) when processing FPX images can be exploited
to cause a heap-based buffer overflow via a specially crafted file.
#####################################################################################

=============
4) The Code
=============

http://www.protekresearchlab.com/exploits/PRL-2012-26.fpx
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19960.fpx
 
Источник
www.exploit-db.com

Похожие темы