9.3
CVSSv2

CVE-2009-1586

Published: 07/05/2009 Updated: 10/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 940
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the NZB importer feature in GrabIt 1.7.2 Beta 3 and previous versions allows remote malicious users to execute arbitrary code via a crafted DTD reference in a DOCTYPE element in an NZB file.

Vulnerable Product Search on Vulmon Subscribe to Product

shemes grabit

shemes grabit 1.5.1

shemes grabit 1.5.3

shemes grabit 1.7.1

shemes grabit 1.6.2

shemes grabit 1.7.2

shemes grabit 1.5.0

shemes grabit 1.6.1

shemes grabit 1.5.2

Exploits

#!/usr/bin/perl # Grabit<=172 Beta 3 (nzb) SEH Overwrite Exploit # Coded by: Gaurav Baruah # Discovery: Niels Teusink #packetstormsecurityorg/filedesc/grabit-overflowtxthtml # Greetz to Vivek #Tested on XP SP3 and XP SP2 (en) my $header1= "<?xml version=\"10\"?> <!DOCTYPE nzb PUBLIC \"-//newzBin//DTD NZB 10//EN\" ...
#!/usr/bin/perl # theroadoutsidemyhouseispavedwithgoodintentionspl # AKA # GrabIt 172x NZB DTD Reference Buffer Overflow Exploit # BY # Jeremy Brown [0xjbrown41@gmailcom] 05072009 # *********************************************************************************************************** # It seems I couldn't gather my resources quickly enou ...