gxine – HTTP Plugin Remote Buffer Overflow PoC
This PoC exploits a buffer overflow vulnerability in the HTTP plugin of gxine 0.5.6. The vulnerability is triggered when a large amount of data is sent to the server. This causes a stack-based buffer overflow, which can be exploited to execute arbitrary code. The vulnerable code is located in the free() function of /lib/tls/libc.so.6. The backtrace of the vulnerable code is 0xb78eccc7 in free () from /lib/tls/libc.so.6, 0xb7438fc8 in ?? () from /usr/lib/xine/plugins/1.1.1/xineplug_inp_http.so, 0x41414141 in ?? (), 0xb7f42164 in ?? () from /usr/lib/libxine.so.1, 0x080b1810 in ?? (), 0xb7f0e635 in xine_open () from /usr/lib/libxine.so.1, 0xb7f3967f in ?? () from /usr/lib/libxine.so.1, 0x0877c084 in ?? (), 0x0930a931 in ?? (), 0x080880a2 in defs.3 (), 0xb0088478 in ?? () and 0x00000000 in ?? ().