Loading HuntDB...

Stack overflow affecting "ext" field on stylers.xml configuration file

Medium
N
Notepad++
Submitted None
Reported by ammm

Vulnerability Details

Technical details and impact analysis

Stack Overflow
**Summary:** A stack buffer overflow vulnerability affects "ext" field into "stylers.xml" configuration file. "isInList" function doesn't check boundaries on word[64] array. **Description:** Vulnerability src file: notepad-plus-plus/PowerEditor/src/MISC/Common/Common.cpp Vulnerability line: line 329 Variable affected: TCHAR word[64]; ## Steps To Reproduce: Notice: All this steps have been tested on 32-bits version of Notepad++. 1. Open "stylers.xml" configuration file (C:\Users\%USERPROFILE%\AppData\Roaming\Notepad++) 2. Modify "ext" field with a long string, such as "123456789012346789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789" (see ExploitationExample.png) 3. Close Notepad++ application and re-open it. 4. Application should crash ## Supporting Material/References: - ExploitationExample.png -> Exploitation example - CrashEvidence.png -> Evidence of vulnerability exploitation ## Impact A local attacker could modify this configuration file to trigger a stack buffer overflow. When the victim re-open Notepad++ vulnerability will be exploited. It's not a remote vulnerability. Local access to stylers.xml is required.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Stack Overflow