![]() CloudMe Sync client creates a socket listening on TCP Port 8888 (0x22B8) In Qt5Core: ``` 00564DF1. This Metasploit module has been tested successfully on Windows 7 SP1 x86. CloudMe Sync 1.10.9 Buffer Overflow CloudMe Sync 1.10.9 Buffer Overflow Posted Authored by Daniel Teixeira, hyp3rlinx Site This Metasploit module exploits a stack-based buffer overflow vulnerability in the CloudMe Sync version 1.10.9 client application. This will result in an attacker controlling the programs execution flow and allowing arbitrary code execution on the victims PC. This Metasploit module exploits a stack-based buffer overflow vulnerability in the CloudMe Sync version 1.10.9 client application. CVE: CVE-2018-6892 # Affected version CloudMe Sync version v1.10.9 and prior # Vulnerability Details An unauthenticated remote attackers that can connect to the “CloudMe Sync” client application listening on port 8888, can send a malicious payload causing a buffer overflow condition. # Credit A security researcher from, hyp3rlinx, has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program # Vendor response The vendor has released CloudMe version 1.11.0 which addresses this vulnerability. It features a blue folder that appears on all devices with the same content, all files are synchronized between devices.” The vulnerability found is a buffer overflow vulnerability, which when exploited can be used to cause the product to execute arbitrary code. CloudMe is “a file storage service operated by CloudMe AB that offers cloud storage, file synchronization and client software. The following advisory describes one (1) vulnerability found in CloudMe. CloudMe CloudMe The European Sync / Storage Service CloudMe HTTP cookie Directory (computing) Email Data Computer data storage Privacy Data Protection Directive User (computing) File synchronization Sweden Password Data synchronization Computer file Third-party software component Data Protection Act 1998 Server (computing) Cloud computing. ![]() Tags: Metasploit Framework (MSF), RemoteĬloudMe Sync 1.10.9 - Stack-Based Buffer Overflow (Metasploit)ĬloudMe Sync 1.10.9 Remote Buffer OverflowĬloudMe Sync 1.9.2 Remote Buffer Overflow Remote exploit for Windows_x86-64 platformĬloudme 1.9 - Buffer Overflow (DEP) (Metasploit)ĬloudMe Sync 1.10.9 - Stack-Based Buffer Overflow (Metasploit). print 'CloudMe Sync v1.10.9 Buffer Overflow with DEP Bypass on Win10 圆4' def createropchain (): rop chain generated with mona.py - ropgadgets 0圆1ba8b5e, POP EAX RETN Qt5Gui.dll 0圆90398a0, ptr to &VirtualAlloc () IAT Qt5Core.dll 0圆1cd7f74, MOV EAX,DWORD PTR DS: EAX RETN Qt5Gui. CloudMe is a file storage service operated by CloudMe AB that offers cloud storage, file synchronization and client software. Remote exploit for Windows platformĬloudme 1.9 - Buffer Overflow (DEP) (Metasploit). ![]() CloudMe Sync 1.11.2 Buffer Overflow - WoW64 - (DEP Bypass)ĬloudMe Sync < 1.11.0 - Buffer Overflow. Exploit Title: CloudMe Sync 1.10.9 - Buffer Overflow (SEH)(DEP Bypass) Date: Exploit Author: Manoj Ahuje Linkedin: Vendor Homepage: Software Link: Tested on: Windows 10 Home (圆4) /usr/bin/env python.
0 Comments
Leave a Reply. |