Description
StyleWriter 1.0 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an excessively long string. Attackers can paste a 6000-byte payload into the Pattern to Find or Advice Message fields in the Add Pattern dialog to trigger a denial of service condition.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Gionathan "John" Reale
References
www.exploit-db.com/exploits/45250 (ExploitDB-45250)
www.editorsoftware.com (Official Product Homepage)
www.editorsoftware.com/StyleWriter_Download.php (Product Reference)
www.vulncheck.com/...ter-denial-of-service-via-pattern-input (VulnCheck Advisory: StyleWriter 1.0 Denial of Service via Pattern Input)