lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <004b01c5db30$53107db0$0300000a@outlaw> Date: Thu Oct 27 20:51:51 2005 From: expanders at libero.it (Expanders) Subject: Hasbani-WindWeb/2.0 Remote DoS [ with exploit ] [i] Title: Hasbani-WindWeb/2.0 - HTTP GET Remote DoS [i] Discovered by: Expanders [i] Exploit by: Expanders [ What is Hasbani-WindWeb/2.0 ] Hasbani server is a httpd created for menaging ethernet routers and adsl modems. [ Why HTTPD crash? ] Causes of DoS are not perfecly known by me 'cos i can't debug a chip-integrated http daemon. Btw seems that Hasbani enter a loop in a GET /..:..:..etc. condition, causes that when an attacker reguest a long crafted string server enter an endless loop with conseguenly crash of the httpd. NOTE: This exploit DON'T drop down victim's adsl connection! [ Exploit ] Attacked or http://download.x0n3-h4ck.org/XH-Hasbani-HTTPD-DoS.c [ Timeline ] This vulnerability was not comunicated because i did'n find Hasbani's vendor. [ Links ] www.x0n3-h4ck.org -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20051027/78567b63/attachment.html -------------- next part -------------- A non-text attachment was scrubbed... Name: XH-Hasbani-HTTPD-DoS.c Type: application/octet-stream Size: 8772 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20051027/78567b63/XH-Hasbani-HTTPD-DoS.obj