vendor:
Perl IMAP Server
by:
Unknown
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Perl IMAP Server
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: CVE-2004-2760
CPE: a:perl_imap_server
Platforms Tested: Windows 2000 Server SP4 English
Unknown
Perl IMAP Server Remote Buffer Overflow
This exploit is a proof of concept for a remote buffer overflow vulnerability in a Perl IMAP server. The exploit takes advantage of a vulnerability in the server's handling of user credentials, allowing an attacker to execute arbitrary code on the server. The exploit uses a combination of NOP sled, return address overwrite, and a shellcode payload to achieve remote code execution. The shellcode used in the exploit is a modified version of the NGS Writing Small Shellcode by Dafydd Stuttard, with changes made to the bind port and added bytes to hide the cmd.exe window on the remote host.
Mitigation:
To mitigate this vulnerability, it is recommended to apply the latest patches and updates for the Perl IMAP server software. Additionally, it is important to use strong and unique credentials for all user accounts on the server.