9.3
CVSSv2

CVE-2009-4656

Published: 03/03/2010 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 950
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in E-Soft DJ Studio Pro 4.2 including 4.2.2.7.5, and 5.x including 5.1.4.3.1, allows user-assisted remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a playlist file (.pls) containing a long string. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

e-soft.co dj studio pro 4.2

e-soft.co dj studio pro 4.2.2.7.5

e-soft.co dj studio pro 5.1.4.3.1

e-soft.co dj studio pro 5.1

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking inclu ...
#!/usr/bin/ruby # Exploit Title : DJ Studio Pro 51652 SEH Exploit # Date : 2009-12-30 # Author : Sébastien Duquette - ekse0x@gmailcom # Software Link : wwwe-softcouk/ # Version : 51652 # Tested on : Windows XP SP2 En # OSVDB ID : 58159 # Overflow originally discovered by prodigy # exec calcexe p ...
#!/usr/bin/perl -w # # DJ Studio Pro 42 (PLS file) Crash Vulnerability Exploit # # Founded and exploited by prodigy # # Contact: smack_the_stream@hotmailcom # # Vendor: wwwe-softcouk/ # # Usage to reproduce the bug: when you created the malicious file, load the file and boooom! # # Platform: Windows # ################################# ...
## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GoodRan ...