Cool PDF Reader 3.0.2.256 - Buffer Overflow

Author: Chris Gabriel
type: dos
platform: windows
port: 
date_added: 2013-02-07  
date_updated: 2013-02-08  
verified: 1  
codes: CVE-2012-4914;OSVDB-89349  
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.comCoolPDFReader.exe  

raw file: 24463.txt  
# Exploit Title: Cool PDF Reader 3.0.2.256 buffer overflow
# Vulnerability Disclosed to US-CERT by Chris Gabriel: 11-20-2012
# Emailed vendor: 12-4-2012
# Francis Provencher discovered vulnerability and reported to Secunia: 12-19-2012
# Vulnerability Discovery: Francis Provencher (Protek Research Lab's) @ProtekResearch
# Vulnerability Discovery: Chris Gabriel
# Exploit Author: Chris Gabriel
# Vendor Homepage: http://www.pdf2exe.com/reader.html
# Version: CoolPDF 3.0.2.256
# Tested on: Windows XP SP3
# CVE: CVE-2012-4914
# Reference: http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=70&Itemid=70
# Reference: http://secunia.com/advisories/51602

PoC:  https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24463.py