============================================================================================================================================= | # Title : libbiosig 3.9.2 Intan CLP File Parser via Crafted HeadLen Field Heap Buffer Overflow | | # Author : indoushka | | # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 147.0.4 (64 bits) | | # Vendor : https://biosig.sourceforge.net/index.html | ============================================================================================================================================= [+] Summary : A specially crafted Intan CLP file can trigger a heap buffer overflow in applications that parse the CLP format without properly validating the HeadLen field. The vulnerable parser allocates memory based on the value of HeadLen but continues reading additional data from the file without enforcing strict bounds checks. The provided Python proof‑of‑concept generates a malicious .clp file that contains valid magic bytes (0x81A4B1F3) and a manipulated header structure designed to bypass basic file type validation. By specifying a controlled HeadLen value and appending excessive payload data beyond the allocated buffer, the file can cause memory corruption when processed by the vulnerable software. Successful exploitation may allow an attacker to overwrite adjacent heap memory structures, potentially leading to application crashes, denial of service, or in certain conditions arbitrary code execution depending on the memory layout and target environment. [+] POC : import struct def generate_exploit_file(filename="exploit.clp"): magic = b"\x81\xa4\xb1\xf3" version = b"\x01\x00\x01\x00" datatype = struct.pack("