Description
Directory traversal vulnerability in the JetAudio.Interface.1 ActiveX control in JetFlExt.dll in jetAudio 7.0.3 Basic and 7.0.3.3016 allows remote attackers to create or overwrite arbitrary local files via a ..\ (dot dot backslash) in the second argument to the DownloadFromMusicStore method. NOTE: some of these details are obtained from third party information. NOTE: this can be leveraged for code execution by overwriting JetAudio.exe, which is launched by the control after completion of the method call.
Exploits
44272007-09-19remoteWindows
jetAudio 7.x - ActiveX 'DownloadFromMusicStore()' Code Execution
By h07
References
cve@mitre.org
http://osvdb.org/37737cve@mitre.org
http://secunia.com/advisories/26787cve@mitre.org
http://www.securityfocus.com/bid/25723cve@mitre.org
http://www.securitytracker.com/id?1018716cve@mitre.org
http://www.vupen.com/english/advisories/2007/3196cve@mitre.org
https://www.exploit-db.com/exploits/4427af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/37737af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26787af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/25723af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1018716af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/3196af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/36693af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/4427