This PoC demonstrates a buffer overflow vulnerability in RarCrack v0.2 due to an unsafe `strcpy` operation into a fixed-size global buffer (`filename`). The exploit triggers a segmentation fault by providing an overly long command-line argument, which overflows the 255-byte buffer.
Classification
Working Poc 95%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:RarCrack v0.2
No auth needed
Prerequisites:Access to execute RarCrack with a long command-line argument