ESTsoft ALPlayer URL crash PoC

2016.09.26
pl zaeek (PL) pl
Risk: Low
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

# Exploit Title: ESTsoft ALPlayer URL crash PoC # Date: 26/09/2016 # Exploit Author: zaeek@protonmail.com # Vendor Homepage: http://www.estsoft.com/ # Version: 2.0.0.4 # Tested on: Windows 7 32/64bit # Thanks to Viotto. ====Description==== ESTsoft ALPlayer doesn't properly check URL input text, causing ability to crash the app by supplying fancy long strings. Not tested for code execution, just a quick write-up. ====Proof-of-Concept==== # 1. Generate 260 A's # 2. In ALPlayer > File > Open > URL... > Paste those A's # 3. Enjoy crashing nice app print "Paste this ultrafancy A's string into URL input" print 'A' * 260


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top