Description
Softdisk 3.0.3 contains a buffer overflow vulnerability in the registration code dialog that allows local attackers to crash the application by supplying an oversized string. Attackers can trigger the vulnerability by entering a 6000-byte payload in the Registration Name field through the Help menu's Enter Registration Code dialog to cause a denial of service.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Gionathan "John" Reale
References
www.exploit-db.com/exploits/45245 (ExploitDB-45245)
www.ezbsystems.com/ (Official Product Homepage)
www.ezbsystems.com/softdisc/download.htm (Product Reference)
www.vulncheck.com/...tdisk-buffer-overflow-denial-of-service (VulnCheck Advisory: Softdisk 3.0.3 Buffer Overflow Denial of Service)