Orb 2.0.01.0049 < 2.54.0018 - DirectShow Denial of Service

EDB-ID:

11632

CVE:

N/A




Platform:

Windows

Date:

2010-03-04


When Orb is first installed it registers several Direct Show filters with the system. When registered these filters are then called whenever a file which has a dependency on such a required filter is accessed. By specially crafting specific headers embedded into an mp3 file we can create a direct code path to code which is vulnerable to a integer division by zero. This vulnerability can be triggered remotely be embedding the crafted mp3 file into HTML. It is also not dependent on a certain media player. Attached is a PoC (Proof-Of-Concept) I wrote for this specific bug. Also included is a Rebuild file for IDA Pro examining the crash.

Download POC:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33707.zip (aac_parser_int_div_by_0_orb.zip)

Timeline:

Discovery * 2/20/2010
Reported * 2/22/2010
Response * 2/22/2010
Additional Info Sent * 2/23/2010
Response * 2/23/2010
Response * 2/26/2010

Crash Confirmed * 3/03/2010

Patch date: Approx. 2 weeks
Expected: 3/19/2010