EDB-ID: 48563 CVE: N/A Author: PARAS BHATIA Type: LOCAL Platform: WINDOWS Date: 2020-06-08 Vulnerable App: Frigate 3.36.0.9 - 'Command Line' Local Buffer Overflow (SEH) (PoC) Vulnerability Details: Vendor Homepage: http://www.frigate3.com/ Software Link Download: http://www.frigate3.com/download/frigate3_pro.exe Exploit Author: Paras Bhatia Discovery Date: 2020-06-07 Vulnerable Software: Frigate Version: <= 3.36.0.9 Vulnerability Type: Local Buffer Overflow Tested on: Windows 7 Ultimate Service Pack 1 (32 bit - English) Steps to Produce the Crash: 1. Run python code: FrigateLCE.py 2. Copy content to clipboard 3. Turn off DEP for Frigate3.exe Additional Information: The exploit code uses a combination of junk, nseh, seh, nops, and shellcode to exploit the buffer overflow vulnerability. The payload is written to a file named FrigateLCE.txt. Advisory/Source Link: Link