This Metasploit module exploits a stack buffer overflow in CyberLink LabelPrint 2.5 and below. The vulnerability is triggered when opening a .lpp project file containing overly long string characters via open file menu. This results in overwriting a structured exception handler record and take over the application. This Metasploit module has been tested on Windows 7 (64 bit), Windows 8.1 (64 bit), and Windows 10 (64 bit).
5b93e4f728713e374facd865bf3645e22f45dbb6fc5e1b5e6aac4c62197b922c
This Metasploit module exploits a stack buffer overflow in Zahir Enterprise Plus version 6 build 10b and below. The vulnerability is triggered when opening a CSV file containing CR/LF and overly long string characters via Import from other File. This results in overwriting a structured exception handler record.
c51c1d1c21392204bf387a607e386388a6773f8a710db6706b904d643e98b8f9
CyberLink LabelPrint versions prior to 2.5 SEH unicode buffer overflow exploit.
38a22e671f25d00ad5c85db271ec90594e8f7dfbb16305379d99e2185f8a26cd
ALLPlayer version 7.4 SEH unicode buffer overflow exploit.
ca1ca522fd89108e5175a0d469750879c75d75143ff8ae8b79094fb603a7709a
Internet Download Manager version 6.28 Build 17 SEH unicode buffer overflow exploit.
20124fa681e0d3c04fd40055ba8e6800edf717da45e493d4113eeb5997407708