Description
Verypdf docPrint Pro 8.0 contains a structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized alphanumeric encoded payload in the User Password or Master Password fields. Attackers can craft a malicious payload with encoded shellcode and SEH chain manipulation to bypass protections and execute a MessageBox proof-of-concept when the password fields are processed during PDF encryption.
Problem types
Product status
Credits
Connor McGarr
References
www.exploit-db.com/exploits/47394 (ExploitDB-47394)
www.verypdf.com (Official Product Homepage)
dl.verypdf.net/docprint_pro_setup.exe (Product Reference)
www.vulncheck.com/...-docprint-pro-local-seh-buffer-overflow (VulnCheck Advisory: Verypdf docPrint Pro 8.0 Local SEH Buffer Overflow)