Stack-based buffer overflow in MagicISO 5.4 build 239 and previous versions allows remote malicious users to execute arbitrary code via a long filename in a .cue file.
#!/usr/bin/env ruby
###################################
#Credits to n00b for finding this bug
#Magic iso has a stacked based buffer over-flow when
#We pass an overly-long file name inside the cue file
#We are able to control alot of the registers so
#Command execution is possible,But im still learning
#Which means this will get released as a do ...
/*
-- poc/demo for magiciso exploit, found by n00b
-- by: v9@fakehalous
-- original email reply comments:
I actually looked into this when you posted this on milw0rm I was able to get it to run arbitrary code, however it was so unreliable it wasn't worth me posting however, it was informative
you have control of several registers, however ...