Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-44083 PoC — Hex Rays IDA Pro 安全漏洞

Source
Associated Vulnerability
Title:Hex Rays IDA Pro 安全漏洞 (CVE-2024-44083)
Description:Hex Rays IDA Pro是比利时Hex Rays公司的一个强大的反汇编器和一个多功能的调试器。常用于逆向工程。 Hex Rays IDA Pro 8.4及之前版本存在安全漏洞,该漏洞源于在处理具有许多跳转指令的代码节时,如果最终跳转对应于实际入口点将要调用的有效载荷,ida64.dll可能会崩溃。
Description
Makes IDA (all versions) to crash upon opening it. 
Readme
# CVE-2024-44083
Crashes IDA most* versions (see Compability section) upon opening the malicious binary. 

# Disclamer
This software is provided "as is" for educational and research purposes only. The author is not responsible for any damage, loss, or legal issues arising from the use or misuse of this software. By using this software, you agree to use it at your own risk and assume full responsibility for any consequences.

# How to use
- Install rust at https://www.rust-lang.org/.
- Compile the binary with ```cargo build```/```cargo build --release```.
- Run it by giving it the following arguments:
```--input {input_file}``` this is the path of the inputed file.
```--output {output_file}``` - this is the path of the saved output. 
```--jumps {number_of_jumps}``` - this is the number of jumps that, the more the better.

# Example
```CVE-2024-44083.exe --input example.exe --output malicious.exe --jumps 50000```

# Compatibility
This was tested for x86_64 PE binaries. meaning if you try it on another format, it might not work.
I do think that if some changes are made, it's possible to make this compatible with other architectures and executable formats.

For IDA versions, it was tested on 7.7, 8.4 and 9.0 and it worked, but i did notice it not working on 7.5

# Fix
https://x.com/daaximus/status/1827759812001591460
File Snapshot

[4.0K] /data/pocs/1003a6a2b73afaefd87b625818db87405d01abff ├── [ 342] Cargo.toml ├── [1.3K] README.md ├── [ 617] rustfmt.toml └── [4.0K] src └── [3.2K] main.rs 2 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.