The writeup describes a buffer overflow vulnerability in Blat v3.2.14 where a 236-byte string in the profile option parameter overwrites EBP and EIP registers, leading to potential DoS or administrative access. The reproduction steps and technical details are provided, but no functional exploit code is included.
Classification
Writeup 90%
Target:
Blat v3.2.14
No auth needed
Prerequisites:
Local access to execute blat.exe with crafted input