DivX 6.6 SRT SEH overwrite PoC
This is a proof of concept exploit for the DivX 6.6 SRT vulnerability. It overwrites the Structured Exception Handler (SEH) to gain control of the program flow. The exploit has been tested on Windows XP SP2. The exploit code is written in Python and was developed by Mati Aharoni (muts) and Chris Hadnagy (loganWHD) of Offensive Security. The exploit utilizes a Unicode buffer and a Unicode friendly POP POP RET sequence. The payload includes stack alignment, saving stack registers, and aligning EAX for popad/fd instructions. The exploit also includes a Venetian self-decoding bindshell on port 4444. The bindshell is 1580 bytes in size and is built on alternating 00 01 surface. The exploit includes a buffer and shellcode canvas of 5000000 bytes.