Re: FTP Exploit?

From: C. Hamby (fixer@gci.net)
Date: Mon Jun 26 2006 - 22:15:55 EDT


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

No guarantees, but try this:

http://downloads.securityfocus.com/vulnerabilities/exploits/ws_ftp2.0.3.pl

The vulns are pretty similar, though not identical so you may need to
tweak the script a bit.

- -cdh

09Sparky@gmail.com wrote:
> Does anyone know of a good way/tool/script (aside from Core) to test this FTP DOS? I can only find and exploit from CORE and I don't have access to that.
>
> Thanks,
>
> 09Sparky
>
>
> (Results from Nessus)
>
>
> It may be possible to make the remote FTP server crash
>
> by sending the command 'STAT *?AAA...AAA.
>
>
> An attacker may use this flaw to prevent your site from distributing files
>
>
> *** Warning : we could not verify this vulnerability.
> *** Nessus solely relied on the banner of this server
>
>
> Risk factor : Medium
>
> CVE : CVE-2002-0073
>
> BID : 4482
>
> Other references : IAVA:2002-A-0002
>
> ------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
> Choice Award from eWeek. As attacks through web applications continue to rise,
> you need to proactively protect your applications from hackers. Cenzic has the
> most comprehensive solutions to meet your application security penetration
> testing and vulnerability management needs. You have an option to go with a
> managed service (Cenzic ClickToSecure) or an enterprise software
> (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
> help you: http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com for details.
> ------------------------------------------------------------------------------
>
>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQEVAwUBRKCU2wt0Y4479LtgAQKkTAf/VVcRZ4ux8dYU5qQUqpXC0qGv9Z0Y4h5s
xdxK1ThbjRB4oECHwcYguZGcUIIiTMP+eDHK5sIEU1DWzT93s2ZDB8s6VzFh72DL
jaIN8gtZLpEyVA2txxeRS+fHnl2UjLWCJD6D01MyVm+VdcJ6p/6eHWhQSxVdTF7J
VCbdOs3kNZG0p1ByrVfcG3IctfGYQharGaO4N8iMB9v9gn6IKmOdk0JnjlsOAsAG
QTztWQi4D84y+rzwsnZRWxftL5Or5l1i3TNCQQZDtdoZ8F8ucuSw2S9sv9IKDphr
4SAsAxEaO4OJKrYV6I7cFPqdQhixFaiR//X/fdajUyrxnpl3++QFig==
=b0jC
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:10 EDT