Best Way GEM Engine - Multiple Vulnerabilities

Javier Perez 12.10.2009 Verified
Remote Exploits Windows

Exploit Code

source: http://www.securityfocus.com/bid/40145/info

GEM Engine is prone to multiple vulnerabilities including multiple denial-of-service issues and a buffer-overflow issue.

An attacker can exploit these issues to cause applications using the engine to crash, resulting in a denial-of-service condition, or to execute arbitrary code in the context of the vulnerable application. Other attacks may also be possible.

GEM Engine 2 and GEM Engine 3 are vulnerable. 

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/33980.zip