what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Holdem Manager 1.11 Memory Corruption

Holdem Manager 1.11 Memory Corruption
Posted Mar 9, 2012
Authored by Michal Bucko

Holdem Manager version 1.11 suffers from multiple memory corruption vulnerabilities.

tags | advisory, vulnerability
SHA-256 | ba957bf5e9140e630cc73a1d40c9a3be12cd74237c09dfc7db9511a85adf3100

Holdem Manager 1.11 Memory Corruption

Change Mirror Download
Eleytt Research
www.eleytt.com


Overview:
====================
Michal A. Bucko


Credit:
====================
Anonymous researcher
Michal A. Bucko




Vulnerability Table
===================

Note: All of the vulnerabilities are reported in Holdem Manager Professional,
poker tracking
software.

1. Holdem Manager 1.11 "Concat" Session Module Memory Corruption
2. Holdem Manager 1.11 Collection Modification Memory Corruption
3. Holdem Manager 1.11 All Hands Function Memory Corruption


Vulnerability Details
=========================
=========================

All three issues have been reported to the vendor who had been
given additional information regarding the issues. For the
security of the players, we are not releasing any more details.

We would like to thank Holdem Manager's team for cooperation.


Eleytt - Company Information
============================

Eleytt Corporation is specialized in penetration testing, vulnerability
development, advanced reverse engineering and exploitation techniques.
Eleytt provides various security-related services: risk assessment,
security policy, security assurance, incident management, web
application security testing, continuous security assurance programs.


DISCLAIMER
==========

This document and all the information it contains are provided "as is",
for educational purposes only, without warranty of any kind, whether
express or implied.

The authors reserve the right not to be responsible for the topicality,
correctness, completeness or quality of the information provided in
this document. Liability claims regarding damage caused by the use of
any information provided, including any kind of information which is
incomplete or incorrect, will therefore be rejected.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close