module

eSignal and eSignal Pro File Parsing Buffer Overflow in QUO

Disclosed
Sep 6, 2011
Created
May 30, 2018

Description

The software is unable to handle the "" files (even those
original included in the program) like those with the registered
extensions QUO, SUM and POR. Successful exploitation of this
vulnerability may take up to several seconds due to the use of
egghunter. Also, DEP bypass is unlikely due to the limited space for
payload. This vulnerability affects versions 10.6.2425.1208 and earlier.

Authors

Luigi Auriemma
TecR0c [email protected]
mr_me [email protected]

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/fileformat/esignal_styletemplate_bof
msf exploit(esignal_styletemplate_bof) > show targets
...targets...
msf exploit(esignal_styletemplate_bof) > set TARGET < target-id >
msf exploit(esignal_styletemplate_bof) > show options
...show and set options...
msf exploit(esignal_styletemplate_bof) > exploit

Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.