# jiNa OCR Image to Text 1.0 - 拒绝服务 (PoC) ## 漏洞概述 * **漏洞类型**: 拒绝服务 (DoS) * **EDB-ID**: 45380 * **作者**: Gionathan "John" Reale * **发布日期**: 2018-09-12 * **受影响版本**: 1.0 ## 影响范围 * **平台**: Windows x86 6 * **受影响应用**: jiNa OCR Image to Text 1.0 ## 修复方案 * 页面未提供具体的修复方案或补丁信息。 ## POC 代码 ```python # Exploit Title: jiNa OCR Image to Text 1.0 - Denial of Service (PoC) # Author: Gionathan "John" Reale # Discovery Date: 2018-09-10 # Software Link: http://www.convertimagetotext.net/downloadsoftware.php # Tested Version: 1.0 # Tested on OS: Windows 7 32-bit # Steps to Reproduce: Run the python exploit script, it will create a new # file with the name "exploit.png"; # Now start the program. Now when you are inside of the program attempt to convert the file "exploit.png" to pdf. # Now wait and you will see a crash! #!/usr/bin/python