vendor:
MP3Info
by:
Ayman Sagy
7.5
CVSS
HIGH
SEH exploit
CWE
Product Name: MP3Info
Affected Version From: MP3Info 0.8.5
Affected Version To: MP3Info 0.8.5
Patch Exists: NO
Related CWE: CVE-2006-2465
CPE:
Platforms Tested: Windows 7 Ultimate 64 and 32 bit
2014
mp3info SEH exploit
The process memory region starts with a null byte but exploitation is still possible because of the little endian architecture provided that the return address gets placed at the end of the buffer, this however confines us in the tiny 4-byte area after pop/pop/retn. Using a couple of trampolines, I jumped back to the beginning of the buffer which is 533 bytes, enough to fit a calc payload.
Mitigation:
Update to a patched version of MP3Info.