This exploit demonstrates a memory leak vulnerability in GNU Barcode 0.99 by providing a crafted input string that triggers the issue in the 'cmdline.c' file, leading to a Denial of Service (DoS). The PoC includes a command-line example that generates a barcode with a malicious payload.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:GNU Barcode 0.99
No auth needed
Prerequisites:GNU Barcode 0.99 installed on the target system