This exploit demonstrates a buffer overflow vulnerability in GOM Audio 2.0.8 by creating a malformed .gas skin file that crashes the application when loaded. The PoC writes a large string of 'A' characters to trigger the crash.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:GOM Audio 2.0.8
No auth needed
Prerequisites:GOM Audio 2.0.8 installed on Windows 7 x86