TugZip 3.5 Zip File Parsing Buffer Overflow Vulnerability

This module exploits a stack-based buffer overflow vulnerability in the latest version 3.5 of TugZip archiving utility. In order to trigger the vulnerability, an attacker must convince someone to load a specially crafted zip file with TugZip by double click or file open. By doing so, an attacker can execute arbitrary code as the victim user.

Module Name

exploit/windows/fileformat/tugzip

Authors

  • Stefan Marin
  • Lincoln
  • TecR0c <roccogiovannicalvi [at] gmail.com>
  • mr_me <steventhomasseeley [at] gmail.com>

References

Targets

  • Universal

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

msf > use exploit/windows/fileformat/tugzip

msf exploit(tugzip) > show targets …targets…

msf exploit(tugzip) > set TARGET <target-id>

msf exploit(tugzip) > show options …show and set options…

msf exploit(tugzip) > exploit

Youtube

http://www.youtube.com/watch?v=jceJAAlA0hk