Rapid7 Vulnerability & Exploit Database

Documalis Free PDF Editor and Scanner JPEG Stack Buffer Overflow

Back to Search

Documalis Free PDF Editor and Scanner JPEG Stack Buffer Overflow

Disclosed
05/22/2020
Created
08/04/2020

Description

Documalis Free PDF Editor version 5.7.2.26 and Documalis Free PDF Scanner version 5.7.2.122 do not appropriately validate the contents of JPEG images contained within a PDF. Attackers can exploit this vulnerability to trigger a buffer overflow on the stack and gain remote code execution as the user running the Documalis Free PDF Editor or Documalis Free PDF Scanner software.

Author(s)

  • metacom
  • metacom27 <metacom27@gmail.com>

Platform

Windows

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/fileformat/documalis_pdf_editor_and_scanner
msf exploit(documalis_pdf_editor_and_scanner) > show targets
    ...targets...
msf exploit(documalis_pdf_editor_and_scanner) > set TARGET < target-id >
msf exploit(documalis_pdf_editor_and_scanner) > show options
    ...show and set options...
msf exploit(documalis_pdf_editor_and_scanner) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;