- INFORMATION GATHERING
This application can play many kinds of media files, like MP3. a playlist (. pls or. m3u)
This web is VUPlayer: http://www.vuplayer.com/vuplayer.php
2. VULNERABILITY IDENTIVICATION
I tries to find flaws VUPlayer applications., in CVE
and the results
from the data above., allowing an attacker to execute code via a long URL arbiter in the line of the file on the file. PLS.,
and on-bassed stack buffer overflow., allows remote attackers to execute code of the arbitrator. in the HREF attribute of a REF element in a file. ASK.
"of data obtained. VUPlayer applications vulnerable to heap-based buffer overflow., This can be exploited remote attackers to execute arbitrary code machines authority, in a context where the user running the affected application"
- The first experiment I would do is to add URL.,
click the file and select Add URL
insert as many characters
look at Olly debug., ESP register was overwritten with our input is entered.,
and this is a very good prefix.
- at this stage I am trying to create a file. pls.., which contains the / X41 * 56 969
make surcut use commands in the picture
insert sorcat on MPlayer:
insert esp address and eip in the application fuzzer
repeat again at the Olly debbg.
seen, the system performs the reading into the buffer (stack).stack contains the character \ xCC
The next stage open the console type. / msfweb
klick generate payload. and insert in fuzzer
save seberti repeat previous stage
Tidak ada komentar:
Posting Komentar