vendor:
Unknown
by:
Craig Freyman and Gerardo Iglesias
N/A
CVSS
N/A
Unknown
Unknown
CWE
Product Name: Unknown
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: Unknown
Platforms Tested: Windows XP SP3
Unknown
Solar FTP 2.1.1 PASV Command PoC
This exploit is a proof-of-concept for the Solar FTP 2.1.1 PASV Command vulnerability. The exploit was developed by Craig Freyman and Gerardo Iglesias. It has been tested on Windows XP SP3. The vendor was contacted on July 11, 2011, and responded on July 12, 2011, stating that they will fix the vulnerability as soon as possible and approved the release of the proof-of-concept. The exploit relies on certain offsets that may vary depending on the subnet that the server is running on. The most consistent behavior was observed using a total buffer of about 2127 bytes. The exploit payload consists of shellcode that binds a TCP shell to a specified port.
Mitigation:
Unknown