Vulnerabilities > CVE-2007-2888 - Unspecified vulnerability in EZB Systems Ultraiso

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
ezb-systems
exploit available
metasploit

Summary

Stack-based buffer overflow in UltraISO 8.6.2.2011 and earlier allows user-assisted remote attackers to execute arbitrary code via a long FILE string (filename) in a .cue file, a related issue to CVE-2007-2761. NOTE: some details are obtained from third party information.

Vulnerable Configurations

Part Description Count
Application
Ezb_Systems
1

Exploit-Db

  • descriptionUltraISO <= 8.6.2.2011 (Cue/Bin Files) Local Buffer Overflow Exploit. CVE-2007-2888. Local exploit for windows platform
    idEDB-ID:4001
    last seen2016-01-31
    modified2007-05-28
    published2007-05-28
    reportern00b
    sourcehttps://www.exploit-db.com/download/4001/
    titleUltraISO <= 8.6.2.2011 Cue/Bin Files Local Buffer Overflow Exploit
  • descriptionUltraISO CUE File Parsing Buffer Overflow. CVE-2007-2888. Local exploit for windows platform
    idEDB-ID:16627
    last seen2016-02-02
    modified2010-04-30
    published2010-04-30
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16627/
    titleUltraISO CUE File Parsing Buffer Overflow
  • descriptionUltraISO <= 8.6.2.2011 (Cue/Bin Files) Local Buffer Overflow PoC. CVE-2007-2888. Dos exploit for windows platform
    fileexploits/windows/dos/3978.pl
    idEDB-ID:3978
    last seen2016-01-31
    modified2007-05-24
    platformwindows
    port
    published2007-05-24
    reportern00b
    sourcehttps://www.exploit-db.com/download/3978/
    titleUltraISO <= 8.6.2.2011 Cue/Bin Files Local Buffer Overflow PoC
    typedos

Metasploit

descriptionThis module exploits a stack-based buffer overflow in EZB Systems, Inc's UltraISO. When processing .CUE files, data is read from file into a fixed-size stack buffer. Since no bounds checking is done, a buffer overflow can occur. Attackers can execute arbitrary code by convincing their victim to open an CUE file. NOTE: A file with the same base name, but the extension of "bin" must also exist. Opening either file will trigger the vulnerability, but the files must both exist.
idMSF:EXPLOIT/WINDOWS/FILEFORMAT/ULTRAISO_CUE
last seen2020-06-14
modified2017-07-24
published2010-03-29
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2888
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/fileformat/ultraiso_cue.rb
titleUltraISO CUE File Parsing Buffer Overflow

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/87754/ultraiso_cue.rb.txt
idPACKETSTORM:87754
last seen2016-12-05
published2010-03-30
reporterjduck
sourcehttps://packetstormsecurity.com/files/87754/UltraISO-CUE-File-Parsing-Buffer-Overflow.html
titleUltraISO CUE File Parsing Buffer Overflow