exploit the possibilities

Mobipocket Reader 6.2 Build 608 Buffer Overflow

Mobipocket Reader 6.2 Build 608 Buffer Overflow
Posted Apr 23, 2012
Authored by shinnai | Site shinnai.altervista.org

Mobipocket Reader version 6.2 build 608 suffers from a buffer overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
MD5 | c965a12afc749d35e50648de2a8b0d3f

Mobipocket Reader 6.2 Build 608 Buffer Overflow

Change Mirror Download
Hash: SHA1

Mobipocket Reader version 6.2 Build 608 Buffer Overflow
Url: http://www.mobipocket.com/en/HomePage/default.asp?Language=EN

Author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org/

This was written for educational purpose. Use it at your own risk.
Author will be not responsible for any damage.

Tested on:
Microsoft Windows 7 Professional
6.1.7601 Service Pack 1 build 7601

Info (http://en.wikipedia.org/wiki/Mobipocket):
Mobipocket SA is a French company incorporated in March 2000 which
produces Mobipocket Reader software, an E-Book reader for some PDAs,
phones and desktop operating systems.

The Mobipocket software package is free and consists of various
publishing and reading tools for PDA, Smartphones, cellular phones
and e-book devices (Symbian, Windows Mobile, Palm OS, webOS, Java ME,
BlackBerry, Psion, Kindle and iLiad).
Mobipocket.com was bought by Amazon.com in 2005.[1] Amazon's acquisition
was believed to be a result of Adobe Systems's announcement that it would
no longer sell its eBook packaging and serving software.[2]

An alpha release of the java-based version of the mobipocket reader was
made available for cellphones on June 30, 2008.[3] There is also a reader
for desktop computers running Microsoft Windows, which also works with
computers running Mac OS X and Linux using WINE.[4]

It has been widely reported that since Amazon's acquisition of Mobipocket,
software support, user support, and platform growth was ended. In December,
2011, it was reported that Amazon officially notified the book publishers
that it was ending support for Mobipocket.
RIP: Mobipocket 2000-2011, Mobipocket eBook Format Is Gone, et.al. The
status of Mobipocket DRM content previously purchased by users continues
to be unclear since currently no other ebook reader supports this propriety
DRM method.

PoC released as is, I have no time at the moment for further investigations


Crafting a .chm file is possible to cause a stack based buffer overflow. In
the case of this PoC, registers at the moment of crash are as follow.

EAX 0012F6B8
ECX 000002D5
EDX 000003E3
EBX 00000000
ESP 0012F6F4
ESI 04064A4C
EIP 00F31941

CPU Stack
Address Value ASCII Comments
0012F6E8 00F31941 Aรณ

As you can see, the content of EIP is just the value of the stack address
at 0x0012F6E8

PoC: http://shinnai.altervista.org/exploits/mobi.rar

Version: GnuPG v1.4.12 (MingW32)



RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    10 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    2 Files
  • 19
    Aug 19th
    18 Files
  • 20
    Aug 20th
    19 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By