vendor:
Sopcast
by:
Sud0
7,5
CVSS
HIGH
Stack Buffer Overflow - SEH
119
CWE
Product Name: Sopcast
Affected Version From: 3.2.9
Affected Version To: 3.2.9
Patch Exists: YES
Related CWE: N/A
CPE: a:sopcast:sopcast
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2010
Sopcast POC by Sud0
Sopcast POC by Sud0 is a stack buffer overflow vulnerability which was tested on Windows XP SP3 EN on VBox with IE 7. The exploit requires internet connection on the box to trigger the vulnerability. After spraying a lot to get a nice unicode usable address 0x20260078, a set of P/P/R instructions are sprayed to come back to the stack. After the spray is finished, the Sopcast control will be loaded and shown on the page. After waiting for approx 3 to 5 seconds, a message box should appear.
Mitigation:
Update to the latest version of Sopcast and Easetuner.