90 lines
No EOL
4.2 KiB
Text
90 lines
No EOL
4.2 KiB
Text
_______________________________________________________
|
|
| |
|
|
/ | * AIMP 2.51 build 330 (ID3v1/ID3v2 Tag) * |
|
|
/---, | * Remote Stack Buffer Overflow PoC (SEH) * |
|
|
-----# ==| | |
|
|
| :) # ==| |......................................................|
|
|
-----'----# | |______________________________________________________|
|
|
|)___() '# |______====____ \___________________________________|
|
|
[_/,-,\"--"------ //,-, ,-,\\\ |/ //,-, ,-, ,-,\\ __#
|
|
( 0 )|===******||( 0 )( 0 )||- o '( 0 )( 0 )( 0 )||
|
|
----'-'--------------'-'--'-'-----------------------'-'--'-'--'-'---------------
|
|
################################################################################
|
|
|
|
|
|
*** Summary: Freeware audio player
|
|
|
|
*** Product web page: http://www.aimp.ru/
|
|
|
|
*** Desc: AIMP version 2.51 build 330 suffers from a stack based buffer overflow
|
|
vulnerability that can be exploited via malicious media file that
|
|
supports ID3 tags (mp3). EIP and ECX registers gets overwritten,
|
|
including the SE handler and the pointer to the next SEH record. The
|
|
issue is trigered by playing the file (crashes within 5 seconds) or
|
|
by viewing the file's metadata or by pressing the F4 key and selecting
|
|
the ID3v1 or ID3v2 tab.
|
|
|
|
*** Tested on Microsoft Windows XP Professional SP3 (English)
|
|
|
|
*** Windbg log:
|
|
|
|
--------------------------------------------------------------------------------
|
|
|
|
(f3c.850): Access violation - code c0000005 (first chance)
|
|
First chance exceptions are reported before any exception handling.
|
|
This exception may be expected and handled.
|
|
eax=00000000 ebx=00000000 ecx=41414141 edx=7c9032bc esi=00000000 edi=00000000
|
|
eip=41414141 esp=0012d770 ebp=0012d790 iopl=0 nv up ei pl zr na pe nc
|
|
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00210246
|
|
*** WARNING: Unable to verify checksum for image00400000
|
|
*** ERROR: Module load completed but symbols could not be loaded for image00400000
|
|
image00400000+0x14141:
|
|
41414141 0000 add byte ptr [eax],al ds:0023:00000000=??
|
|
|
|
--------------------------------------------------------------------------------
|
|
|
|
|
|
*** Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
|
|
|
*** liquidworm gmail com
|
|
|
|
*** http://www.zeroscience.org/
|
|
|
|
*** 29.05.2009
|
|
|
|
|
|
################################################################################
|
|
|
|
>>> *** PoC: http://www.zeroscience.org/codes/aimp2_evil.mp3 ~2.92 MB <<<
|
|
>>> *** PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3) ~2.92 MB <<<
|
|
|
|
################################################################################
|
|
|
|
|
|
|
|
|
|
'SHPA !!!
|
|
###########
|
|
. .
|
|
.n . . n.
|
|
. .dP dP 9b 9b. .
|
|
4 qXb . dX Xb . dXp t
|
|
dX. 9Xb .dXb __ __ dXb. dXP .Xb
|
|
9XXb._ _.dXXXXb dXXXXbo. .odXXXXb dXXXXb._ _.dXXP
|
|
9XXXXXXXXXXXXXXXXXXXVXXXXXXXXOo. .oOXXXXXXXXVXXXXXXXXXXXXXXXXXXXP
|
|
`9XXXXXXXXXXXXXXXXXXXXX'~ ~`OOO8b d8OOO'~ ~`XXXXXXXXXXXXXXXXXXXXXP'
|
|
`9XXXXXXXXXXXP' `9XX' Yo! `98v8P' Thricer `XXP' `9XXXXXXXXXXXP'
|
|
~~~~~~~ 9X. .db|db. .XP ~~~~~~~
|
|
)b. .dbo.dP'`v'`9b.odb. .dX(
|
|
,dXXXXXXXXXXXb dXXXXXXXXXXXb.
|
|
dXXXXXXXXXXXP' . `9XXXXXXXXXXXb
|
|
dXXXXXXXXXXXXb d|b dXXXXXXXXXXXXb
|
|
9XXb' `XXXXXb.dX|Xb.dXXXXX' `dXXP
|
|
`' 9XXXXXX( )XXXXXXP `'
|
|
XXXX X.`v'.X XXXX
|
|
XP^X'`b d'`X^XX
|
|
X. 9 ` ' P )X
|
|
`b ` ' d'
|
|
` '
|
|
|
|
# milw0rm.com [2009-06-01] |