Description
StreamRipper32 version 2.6 contains a buffer overflow vulnerability in the Station/Song Section that allows attackers to overwrite memory by manipulating the SongPattern input. Attackers can craft a malicious payload exceeding 256 bytes to potentially execute arbitrary code and compromise the application.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Andy Bowden
References
www.exploit-db.com/exploits/48517 (ExploitDB-48517)
streamripper.sourceforge.net/ (StreamRipper Vendor Homepage)
www.vulncheck.com/advisories/streamripper-buffer-overflow (VulnCheck Advisory: StreamRipper32 2.6 - Buffer Overflow)