This exploit triggers an access violation crash in CCextractor 0.80 by writing a malformed buffer to a file and executing the vulnerable binary. The PoC demonstrates a denial-of-service (DoS) condition via a crafted input file.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:CCextractor 0.80
No auth needed
Prerequisites:CCextractor 0.80 installed on the target system · Ability to execute the binary with the crafted input file