Praetorian503 Posted February 18, 2013 Report Posted February 18, 2013 Photodex ProShow Producer version 5.0.3297 suffers from a stack-based buffer overflow vulnerability. When opening a crafted transition file (.pxt) the application loads the "title" value from the pxt file. The application does not properly validate the length of the string loaded from the "title" value from the pxt file before using it in the further application context, which leads to a buffer overflow condition with possible code execution via overwritten SEH chains on Windows XP/7 32bit. Proof of concept code included.Inshell Security Advisoryhttp://www.inshell.net1. ADVISORY INFORMATION-----------------------Product: Photodex ProShow ProducerVendor URL: www.photodex.comType: Stack-based Buffer Overflow [CWE-121]Date found: 2013-02-16Date published: 2013-02-16CVSSv2 Score: 6,8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)CVE: -2. CREDITS----------This vulnerability was discovered and researched by Julien Ahrens fromInshell Security.3. VERSIONS AFFECTED--------------------Photodex ProShow Producer v5.0.3297, older versions may be affected too.4. VULNERABILITY DESCRIPTION----------------------------A buffer overflow vulnerability has been identified in Photodex ProShowProducer v5.0.3297.When opening a crafted transition file (.pxt) the application loads the"title" value from the pxt file.The application does not properly validate the length of the stringloaded from the "title" value from the pxt file before using it in thefurther application context, which leads to a buffer overflow conditionwith possible code execution via overwritten SEH chains on Windows XP/732bit.An attacker needs to force the victim to open a crafted .pxt file inorder to exploit the vulnerability. Successful exploits can allowattackers to execute arbitrary code with the privileges of the userrunning the application. Failed exploits will result indenial-of-service conditions.5. PROOF-OF-CONCEPT (Code / Exploit)------------------------------------The following generated string has to be inserted into a .pxt file totrigger the vulnerability.#!/usr/bin/pythonfile="poc.txt"junk1="\x41" * 24eip="\x42" * 4junk2="\xCC" * 50000poc=junk1 + eip + junk2try: print ("[*] Creating exploit file...\n"); writeFile = open (file, "w") writeFile.write( poc ) writeFile.close() print ("[*] File successfully created!");except: print ("[!] Error while creating file!");For further Screenshots and/or PoCs visit:http://security.inshell.net/advisory/476. SOLUTION-----------None7. REPORT TIMELINE------------------2013-02-16: Discovery of the vulnerability2013-02-16: Full Disclosure because the vendor ignored previous reports.8. REFERENCES-------------http://security.inshell.net/advisory/47Source: PacketStorm Quote