Skip to content

monsi/CRAM

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

CRAM

Cisco Randomly Accessed Memory

This script is associated with CVE-2014-3392
http://www.securityfocus.com/bid/70306
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa

This simple script is used to test Cisco VPN login/logout pages for the noted memory leak in CVE-2014-3392.

The script is not perfect and I am always open for suggestions on how to improve it.
Sample Usage:

$ CRAM -h
CRAM [-h] [-t] [-v] [-r]

  -h    Show this help text
  -t    Target (Required)
  -v    Verbose
  -r    Number of Random number requests
$ CRAM -t example.com

Page to be targeted: https://example.com/+CSCOE+/logon.html?

The following requests have been known to generate output:
Success: -88
Success: -102
Success: -202
Success: -22222
Fail (-99999)

The following requests will use random numbers:
Fail (-56199)
Success: -196985
Fail (-5666)
Fail (-77368)
Fail (-71669)
Fail (-11153)
Fail (-178318)
Fail (-71728)
Fail (-51999)
Success: -83449

10 random numbers were tested against example.com

About

Cisco Randomly Accessed Memory

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages