This Metasploit module exploits a stack-based buffer overflow in Audiotran 1.4.1. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extention is registered to Audiotran. This functionality has not been tested in this module.
fe48caf317027e30bd5da8dd119e9fa08b7127b8f16f258298a6f1979a6d973f
This Metasploit module exploits a buffer overflow in Audio Workstation 6.4.2.4.3. When opening a malicious pls file with the Audio Workstation, a remote attacker could overflow a buffer and execute arbitrary code.
d9f34d3ca724495af9e1703e2053bf024bceb6935e3dacafc2b68f298b46fb9a