*** Summary: Freeware audio player
*** Product web page: http://www.aimp.ru/
*** Desc: AIMP version 2.51 build 330 suffers from a stack based buffer overflow
vulnerability that can be exploited via malicious media file that
supports ID3 tags (mp3). EIP and ECX registers gets overwritten,
including the SE handler and the pointer to the next SEH record. The
issue is trigered by playing the file (crashes within 5 seconds) or
by viewing the file's metadata or by pressing the F4 key and selecting
the ID3v1 or ID3v2 tab.
*** Tested on Microsoft Windows XP Professional SP3 (English)
*** Windbg log:
--------------------------------------------------------------------------------
(f3c.850): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=00000000 ebx=00000000 ecx=41414141 edx=7c9032bc esi=00000000 edi=00000000
eip=41414141 esp=0012d770 ebp=0012d790 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00210246
*** WARNING: Unable to verify checksum for image00400000
*** ERROR: Module load completed but symbols could not be loaded for image00400000
image00400000+0x14141:
41414141 0000 add byte ptr [eax],al ds:0023:00000000=??
--------------------------------------------------------------------------------
*** Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
*** liquidworm gmail com
*** http://www.zeroscience.org/
*** 29.05.2009
>>> *** PoC: http://www.zeroscience.org/codes/aimp2_evil.mp3 ~2.92 MB <<<