vendor:
jetAudio
by:
Krystian Kloskowski (h07) <h07@interia.pl>
7.5
CVSS
HIGH
SEH Overwrite Exploit
CWE
Product Name: jetAudio
Affected Version From: jetAudio 7.x
Affected Version To: jetAudio 7.x
Patch Exists: NO
Related CWE:
CPE: a:jetaudio:jetaudio:7.x
Platforms Tested: Windows 2000 SP4 Polish
2007
jetAudio 7.x (m3u File) 0day Local SEH Overwrite Exploit
This exploit takes advantage of a SEH (Structured Exception Handling) overwrite vulnerability in jetAudio 7.x. By crafting a specially crafted m3u file, an attacker can overwrite the SEH record and execute arbitrary code. The exploit has been tested on jetAudio 7.0.3 Basic on Windows 2000 SP4 Polish. The exploit payload is a Windows Execute Command shellcode that launches the Calculator. This exploit is provided for educational purposes only.
Mitigation:
Apply the latest security patches provided by the vendor. Avoid opening or running suspicious m3u files from untrusted sources.