Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2007-5962 PoC — vsftpd 资源管理错误漏洞

Source
Associated Vulnerability
Title:vsftpd 资源管理错误漏洞 (CVE-2007-5962)
Description:vsftpd是一款用于类Unix系统的FTP(文件传输协议)服务器。 vsftpd 2.0.5之前版本存在资源管理错误漏洞。攻击者利用该漏洞导致系统拒绝服务。以下产品及版本受到影响:Red Hat Enterprise Linux (RHEL) 5版本、Fedora 6版本至8版本。
Description
vsftpd 2.0.5 - 'CWD' (Authenticated) Remote Memory Consumption
Readme

<h1 align = "center"> CVE-2007-5962 </h1>
<img src="img/banner.png" alt="banner">



## 1. Introduction

My tool is written in Python and exploits the CVE-2007-5962 vulnerability to perform a series of directory changes that crash the ftp daemon.
<pre>
        <b> *** DISCLAIMER!!! ***</b>
        Please note that the use of hacking tools without authorization is illegal and
        could result in legal problems. Therefore, it is important to use this tool
        only for testing purposes on systems where you have permission to act.
</pre>
## 2. conditions to exploit this vulnerability

- firewall disabled or compromised

- the attacker must know the username and password of an ftp account

- ftp passwords travel unencrypted and could be sniffed

## 3. help use
<img src="img/screenHelper.png" alt="screen helper">

## 4. source from which I took inspiration:

[vsftpd 2.0.5 - 'CWD' (Authenticated) Remote Memory Consumption](https://www.exploit-db.com/exploits/5814)

File Snapshot

[4.0K] /data/pocs/f3cee5d65365c70c3955e364ae5564b01e3c81f7 ├── [ 963] exploitModuleFTP.py ├── [2.4K] exploit_vsftpd__2_0_5.py ├── [4.0K] img │   ├── [ 42K] banner.png │   └── [ 22K] screenHelper.png ├── [ 34K] LICENSE └── [ 982] README.md 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.