Internet Download Manager 6.37.11.1 – Stack Buffer Overflow (PoC)
Multiple stack buffer overflow vulnerabilities have been discovered in the official Internet Download Manager v6.37.11.1 software. The buffer overflow allows to overwrite registers of the process to compromise the file-system by elevates local process privileges. The first stack buffer overflow is located in the `search` function of the downloads menu. The search function itself does not use any secure restriction in the requested search variable of the inputs. Local attackers with access to the software are able to overflow the registers to elevate local process privileges. The second stack buffer overflow is located in the `Export/Import` function of the tasks menu. Local users are able to import and export the download tasks as *.ef2 file. Local attackers are able to import manipulated *.ef2 files with manipulated referer and source url to overwrite the eip register. The third stack buffer overflow is located in the `Download` function of the tasks menu. Local users are able to download files with manipulated referer and source url to overwrite the eip register. The fourth, fifth, sixth, seventh, eighth, ninth and tenth stack buffer overflow is located in the `Download` function of the tasks menu. Local users are able to download files with manipulated referer and source url to overwrite the eip register.