This Metasploit module exploits a stack-based buffer overflow vulnerability in GetGo Download Manager version 4.9.0.1982 and earlier, caused by an overly long HTTP response header. By persuading the victim to download a file from a malicious server, a remote attacker could execute arbitrary code on the system or cause the application to crash. This Metasploit module has been tested successfully on Windows XP SP3.
d221161463d2ce4c841da81d4b8047cf3a870adfd262c14d29a88c0aff92cacf
GetGo Download Manager version 4.9.0.1982 HTTP response header buffer overflow remote code execution exploit.
b71f7cfd63c6e6d52aa0cd84b8e6587aad6d03dad7f571d24247fbf0842affa4
GetGo Download Manager versions 4.9.0.1982, 4.8.2.1346, and 4.4.5.502 suffer from a stack based buffer overflow.
37e7b43cd0b640f958d68aebcb6fef26f37e335a1fdb848743f568b90af6185c