module

CyberLink LabelPrint 2.5 Stack Buffer Overflow

Disclosed
2017-09-23
Created
2019-03-19

Description

This module exploits a stack buffer overflow in CyberLink LabelPrint 2.5 and below.
The vulnerability is triggered when opening a .lpp project file containing overly long string characters
via open file menu. This results in overwriting a structured exception handler record and take over the
application. This module has been tested on Windows 7 (64 bit), Windows 8.1 (64 bit), and Windows 10 (64 bit).

Authors

modpr0be tom@spentera.id
f3ci marie@spentera.id

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/fileformat/cyberlink_lpp_bof
msf exploit(cyberlink_lpp_bof) > show targets
...targets...
msf exploit(cyberlink_lpp_bof) > set TARGET < target-id >
msf exploit(cyberlink_lpp_bof) > show options
...show and set options...
msf exploit(cyberlink_lpp_bof) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.